Description
The MMA Call Tracking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.15. This is due to missing nonce validation when saving plugin configuration on the `mma_call_tracking_menu` admin page. This makes it possible for unauthenticated attackers to modify call tracking configuration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-02-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: CSRF – unauthorized settings alteration
Action: Apply Patch
AI Analysis

Impact

The MMA Call Tracking plugin for WordPress contains a Cross‑Site Request Forgery flaw that allows an unauthenticated attacker to alter plugin settings due to the missing nonce validation on the mma_call_tracking_menu admin page. By forging a request, an attacker can modify configuration parameters such as tracking numbers or callback settings without the site administrator's knowledge. This can disrupt call handling, alter analytics, or downgrade tracking quality, resulting in loss of accurate data potential business impact.

Affected Systems

The vulnerability affects the Messagemetric MMA Call Tracking plugin for WordPress in all releases up to and including version 2.3.15. Any WordPress site using this plugin and not yet updated is potentially exposed to the CSRF attack described above.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The flaw is not listed in CISA's KEV catalog. Exploitation requires the attacker to convince an administrator to click a malicious link or submit a crafted form that bypasses the nonce check. Because the vulnerability is confined to configuration pages and does not grant arbitrary code execution, the risk is limited to unauthorized changes to call tracking configuration.

Generated by OpenCVE AI on April 15, 2026 at 18:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MMA Call Tracking plugin to the latest version, which restores nonce verification on the settings page.
  • If an update is not immediately possible, restrict access to the settings page using IP whitelisting or two‑factor authentication to prevent attackers from injecting forged requests.
  • Review and monitor the plugin’s configuration for unexpected changes and audit admin activity logs for anomalies.

Generated by OpenCVE AI on April 15, 2026 at 18:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Messagemetric
Messagemetric mma Call Tracking
Wordpress
Wordpress wordpress
Vendors & Products Messagemetric
Messagemetric mma Call Tracking
Wordpress
Wordpress wordpress

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Description The MMA Call Tracking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.15. This is due to missing nonce validation when saving plugin configuration on the `mma_call_tracking_menu` admin page. This makes it possible for unauthenticated attackers to modify call tracking configuration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title MMA Call Tracking <= 2.3.15 - Cross-Site Request Forgery to Plugin Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Messagemetric Mma Call Tracking
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:42.156Z

Reserved: 2026-01-19T21:46:26.880Z

Link: CVE-2026-1215

cve-icon Vulnrichment

Updated: 2026-02-11T15:37:08.928Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T09:15:51.177

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1215

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:45:11Z

Weaknesses