Description
Cross-Site Request Forgery (CSRF) vulnerability in launchinteractive Merge + Minify + Refresh merge-minify-refresh allows Cross Site Request Forgery.This issue affects Merge + Minify + Refresh: from n/a through <= 2.14.
Published: 2026-01-22
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery enabling unauthorized actions by authenticated users
Action: Patch
AI Analysis

Impact

Cross‑Site Request Forgery (CSRF) is present in the Merge + Minify + Refresh WordPress plugin because it does not validate the authenticity of state‑changing requests. This flaw can allow an attacker to cause a logged‑in user to perform privileged actions without the user’s consent. Based on the description, it is inferred that the plugin may permit modification of site settings or content when accessed via administrative endpoints without a CSRF token.

Affected Systems

Any WordPress installation that includes launchinteractive’s Merge + Minify + Refresh plugin version 2.14 or earlier is affected. The vulnerability applies to all deployments that have not upgraded beyond that release.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Because it is a CSRF weakness, an attacker would need to entice an authenticated user—typically an administrator—to visit a malicious site that triggers the plugin’s vulnerable endpoints. Based on the description, it is inferred that controlling the end‑user’s interaction with the site is required for exploitation.

Generated by OpenCVE AI on April 16, 2026 at 07:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Merge + Minify + Refresh to the latest release that includes the CSRF fix
  • If a patch is not yet available, restrict administrative access to trusted IP addresses or enforce multi‑factor authentication to reduce the impact of CSRF
  • Implement or configure a security plugin that adds CSRF token validation to all admin forms

Generated by OpenCVE AI on April 16, 2026 at 07:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in launchinteractive Merge + Minify + Refresh merge-minify-refresh allows Cross Site Request Forgery.This issue affects Merge + Minify + Refresh: from n/a through <= 2.14.
Title WordPress Merge + Minify + Refresh plugin <= 2.14 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:48.376Z

Reserved: 2026-01-22T14:42:48.125Z

Link: CVE-2026-24384

cve-icon Vulnrichment

Updated: 2026-01-22T20:14:23.623Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:41.500

Modified: 2026-04-28T15:16:08.813

Link: CVE-2026-24384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:45:06Z

Weaknesses