Description
The WP Posts Re-order plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `cpt_plugin_options()` function. This makes it possible for unauthenticated attackers to update the plugin settings including capability, autosort, and adminsort settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-03-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized settings modification via CSRF
Action: Patch immediately
AI Analysis

Impact

The WP Posts Re-order plugin, in all versions up to 1.0, fails to validate nonces in the cpt_plugin_options() function. This flaw allows an unauthenticated attacker to send a forged request that causes a logged‑in administrator to unknowingly submit form data, thereby changing plugin settings such as capability levels, autosort, and adminsort. The resulting unauthorized configuration changes can alter how content is sorted or displayed and may grant elevated privileges to the attacker. The weakness is a classic Cross‑Site Request Forgery (CWE‑352).

Affected Systems

The vulnerability impacts sites running the suifengtec WP Posts Re-order WordPress plugin version 1.0 or earlier. Any WordPress installation that has this plugin installed and has not been updated beyond version 1.0 is affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. Exploitation requires the attacker to lure an administrator into clicking a crafted link or submitting a form, a common social‑engineering tactic. Because the flaw is not tied to server‑side code execution, the risk is lower than RCE but still significant for sites that rely on the plugin’s sorting behavior. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation but that it remains a viable threat. The likely attack vector is HTTP requests originating from an attacker’s domain that trick a site administrator into executing the request.

Generated by OpenCVE AI on March 21, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Posts Re-order plugin to the latest version that includes nonce validation
  • If a newer version is unavailable, consider removing the plugin from the site
  • Verify that all administrative interfaces are protected behind strong authentication and that users are educated about phishing and CSRF risks

Generated by OpenCVE AI on March 21, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Suifengtec
Suifengtec wp Posts Re-order
Wordpress
Wordpress wordpress
Vendors & Products Suifengtec
Suifengtec wp Posts Re-order
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The WP Posts Re-order plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `cpt_plugin_options()` function. This makes it possible for unauthenticated attackers to update the plugin settings including capability, autosort, and adminsort settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title WP Posts Re-order <= 1.0 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Suifengtec Wp Posts Re-order
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:38:06.091Z

Reserved: 2026-01-23T18:29:35.917Z

Link: CVE-2026-1378

cve-icon Vulnrichment

Updated: 2026-03-24T15:09:10.295Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:52.810

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:32Z

Weaknesses