Description
The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-28
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized settings modification
Action: Immediate Patch
AI Analysis

Impact

The imwptip WordPress plugin contains a Cross‑Site Request Forgery vulnerability that allows an unauthenticated attacker to modify the plugin’s settings when a site administrator inadvertently submits a forged request. The flaw is caused by missing nonce validation on the settings update functionality, meaning that any user who can trick an administrator into clicking a link or submitting a form could change configuration values. These changes could leak sensitive data, change the way the plugin behaves, or otherwise give the attacker functional influence over the site’s operation.

Affected Systems

The vulnerability affects all releases of the imwptip plugin up to and including version 1.1, as distributed by the plugin author hu_chao.

Risk and Exploitability

With a CVSS score of 4.3 the risk is moderate. The EPSS score of less than 1% indicates an extremely low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is provided by a CSRF request – an attacker does not need authentication but must persuade an administrator to perform a state‑changing action, such as clicking a link. Because the flaw involves an unauthenticated CSRF vector, the feasibility is high for an attacker able to send crafted requests to the target site.

Generated by OpenCVE AI on April 15, 2026 at 21:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the imwptip plugin to the newest available version, which includes nonce validation for settings updates.
  • If an upgrade is not possible, disable the imwptip plugin or remove its settings update endpoint until a patch is released.
  • Apply general WordPress hardening practices, such as keeping core and all plugins up to date, using a web application firewall, and monitoring for anomalous POST requests.

Generated by OpenCVE AI on April 15, 2026 at 21:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
Description The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title imwptip <= 1.1 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:52.422Z

Reserved: 2026-01-23T18:27:44.043Z

Link: CVE-2026-1377

cve-icon Vulnrichment

Updated: 2026-01-28T14:38:28.289Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T12:15:52.740

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:45:14Z

Weaknesses