Description
The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-02-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes via CSRF
Action: Apply Patch
AI Analysis

Impact

The WP Plugin Info Card plugin for WordPress is vulnerable to Cross‑Site Request Forgery from missing nonce validation in its ajax_save_custom_plugin() function. An unauthenticated attacker can forge an admin request to create or modify custom plugin entries, inserting arbitrary data that will be displayed to site visitors. This can be used to deface content, embed malicious links, or mislead users, compromising the integrity and trust of the site.

Affected Systems

Affected product: WP Plugin Info Card by brikou. Versions 6.2.0 and earlier are vulnerable. The issue arises in the PHP admin component of the plugin.

Risk and Exploitability

The CVSS score is 4.3 (medium) and the EPSS score is less than 1%, indicating a low likelihood of widespread exploitation. The vulnerability is not listed in the KEV catalog. The attack requires an administrator to be logged in and to click a crafted link; the CSRF nature means that the vulnerability is exploitable via a simple link, so mitigation is straightforward. No known public exploit appears to be available, but the low EPSS does not eliminate risk.

Generated by OpenCVE AI on April 15, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Plugin Info Card to a version newer than 6.2.0 where the nonce validation is restored.
  • If an upgrade is not possible, disable the custom plugin entry feature by removing or commenting out the ajax_save_custom_plugin() check in the Admin/Init.php file.
  • As a temporary measure, block the AJAX endpoint for unauthenticated users using server rules such as .htaccess or firewall configurations.

Generated by OpenCVE AI on April 15, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Brikou
Brikou wp Plugin Info Card
Wordpress
Wordpress wordpress
Vendors & Products Brikou
Brikou wp Plugin Info Card
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title WP Plugin Info Card <= 6.2.0 - Cross-Site Request Forgery to Arbitrary Custom Plugin Entry Creation
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Brikou Wp Plugin Info Card
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:21.792Z

Reserved: 2026-02-05T20:40:19.430Z

Link: CVE-2026-2023

cve-icon Vulnrichment

Updated: 2026-02-18T12:25:25.692Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T06:16:35.223

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:30:13Z

Weaknesses