Description
The Petje.af plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 2.1.8. This is due to missing nonce validation in the ajax_revoke_token() function which handles the 'petjeaf_disconnect' AJAX action. The function performs destructive operations including revoking OAuth2 tokens, deleting user meta, and deleting WordPress user accounts (for users with the 'petjeaf_member' role) without verifying the request originated from a legitimate source. This makes it possible for unauthenticated attackers to force authenticated users to delete their Petje.af member user accounts via a forged request granted the victim clicks on a link or visits a malicious site.
Published: 2026-04-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Destructive user account deletion via CSRF
Action: Immediate Patch
AI Analysis

Impact

The Petje.af plugin for WordPress is vulnerable to a Cross‑Site Request Forgery flaw that allows an attacker to trigger the 'petjeaf_disconnect' AJAX action without any nonce verification. This action performs critical operations such as revoking OAuth2 tokens, deleting user meta, and permanently removing WordPress user accounts that have the 'petjeaf_member' role. Consequently, an attacker who can convince an authenticated user to load a malicious page can cause that user to lose their Petje.af member account and associated data. The weakness is classified as CWE‑352.

Affected Systems

All versions of Petje.af up to and including 2.1.8 are impacted. The affected product is the Petje.af WordPress plugin, as listed by its CNA vendor "petjeaf". Users running any of these versions should verify whether they are within this version range.

Risk and Exploitability

The CVSS score is 4.3, indicating a medium severity level. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting that known exploitation cases are limited or not yet reported. Attackers would need the victim to click a crafted link or visit a malicious site, which provides a reasonably low barrier to exploitation for socially engineered users. The risk is mitigated only by preventing the CSRF request from being accepted, which requires a patch or configuration change from the vendor.

Generated by OpenCVE AI on April 15, 2026 at 10:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Petje.af plugin to the latest released version where the CSRF validation has been added to the petjeaf_disconnect AJAX handler.
  • If an update is not immediately available, disable or restrict the petjeaf_disconnect AJAX action for non‑admin users, ensuring only authorized accounts can invoke it.
  • As a temporary workaround, manually modify the plugin’s class-petje-af-oauth2-provider.php file to add a nonce check to the ajax_revoke_token() function before performing any destructive operations.

Generated by OpenCVE AI on April 15, 2026 at 10:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Petjeaf
Petjeaf petje.af
Wordpress
Wordpress wordpress
Vendors & Products Petjeaf
Petjeaf petje.af
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Petje.af plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 2.1.8. This is due to missing nonce validation in the ajax_revoke_token() function which handles the 'petjeaf_disconnect' AJAX action. The function performs destructive operations including revoking OAuth2 tokens, deleting user meta, and deleting WordPress user accounts (for users with the 'petjeaf_member' role) without verifying the request originated from a legitimate source. This makes it possible for unauthenticated attackers to force authenticated users to delete their Petje.af member user accounts via a forged request granted the victim clicks on a link or visits a malicious site.
Title Petje.af <= 2.1.8 - Cross-Site Request Forgery to Account Deletion via 'petjeaf_disconnect' AJAX Action
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Petjeaf Petje.af
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-15T15:50:38.937Z

Reserved: 2026-03-11T18:44:40.867Z

Link: CVE-2026-4002

cve-icon Vulnrichment

Updated: 2026-04-15T15:50:35.879Z

cve-icon NVD

Status : Received

Published: 2026-04-15T09:16:32.547

Modified: 2026-04-15T09:16:32.547

Link: CVE-2026-4002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:22Z

Weaknesses