Description
The OPEN-BRAIN plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5.0. This is due to missing nonce verification on the settings form in the func_page_main() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-04-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Apply Patch
AI Analysis

Impact

The OPEN‑BRAIN plugin for WordPress contains a flaw where the settings form in the func_page_main() function does not perform nonce verification. This flaw allows an attacker who is not authenticated to forge a request that will be executed in the context of any logged‑in administrator who follows the attacker’s link. The attacker can therefore inject malicious scripts or alter the site’s configuration without requiring any credentials. The weakness is a classic CSRF vulnerability, identified by CWE‑352.

Affected Systems

WordPress installations running the OPEN‑BRAIN plugin by faridsaniee with a version of 0.5.0 or earlier are vulnerable. Versions newer than 0.5.0 have removed the missing nonce check and are not affected.

Risk and Exploitability

The CVSS score of 6.1 indicates the vulnerability has moderate severity. No EPSS score is available, so a precise exploitation probability cannot be quantified. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires only that an attacker craft a malicious request and plant it in a link or email that an administrator will click; once the administrator follows that link, the request is processed with their elevated privileges. Because the attacker does not need to log in, the risk to site integrity and availability is considerable, though the overall likelihood of exploitation depends on the administrator’s susceptibility to social engineering.

Generated by OpenCVE AI on April 15, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OPEN‑BRAIN plugin to any version newer than 0.5.0, which removes the missing nonce check.
  • If an upgrade is not possible, disable or uninstall the plugin until a patched version becomes available.
  • If the plugin must remain active, implement server‑side CSRF protection by adding a nonce validation step to the settings form before processing any requests.

Generated by OpenCVE AI on April 15, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Faridsaniee
Faridsaniee open-brain
Wordpress
Wordpress wordpress
Vendors & Products Faridsaniee
Faridsaniee open-brain
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description The OPEN-BRAIN plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5.0. This is due to missing nonce verification on the settings form in the func_page_main() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title OPEN-BRAIN <= 0.5.0 - Cross-Site Request Forgery
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Faridsaniee Open-brain
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-15T15:48:59.579Z

Reserved: 2026-03-12T21:16:13.890Z

Link: CVE-2026-4091

cve-icon Vulnrichment

Updated: 2026-04-15T15:48:56.744Z

cve-icon NVD

Status : Received

Published: 2026-04-15T09:16:33.050

Modified: 2026-04-15T09:16:33.050

Link: CVE-2026-4091

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:18Z

Weaknesses