Description
The mCatFilter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.5.2. This is due to the complete absence of nonce verification and capability checks in the compute_post() function, which processes settings updates. The compute_post() function is called in the plugin constructor on every page load via the plugins_loaded hook, and it directly processes $_POST data to modify plugin settings via update_option() without any CSRF token validation. This makes it possible for unauthenticated attackers to modify all plugin settings, including category exclusion rules, feed exclusion flags, and tag page exclusion flags, via a forged POST request, granted they can trick a site administrator into performing an action such as clicking a link.
Published: 2026-04-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration change via CSRF
Action: Patch
AI Analysis

Impact

The mCatFilter WordPress plugin accepts settings updates through its compute_post() function without any nonce verification or capability checks. The function is called on every page load and processes raw POST data to modify plugin settings via update_option(). Consequently, an unauthenticated attacker can send a forged POST request that a site administrator unknowingly executes, allowing the attacker to alter plugin settings such as category exclusions, feed flags, and tag page exclusions. The impact is the compromise of the plugin’s configuration integrity, which can affect content visibility and site functionality.

Affected Systems

All installations of the mCatFilter plugin for WordPress up to and including version 0.5.2 are affected. Administrators using any WordPress site with these plugin versions are at risk.

Risk and Exploitability

This vulnerability carries a CVSS score of 4.3, indicating medium severity. EPSS information is not available, so the exploitation probability cannot be quantified. The issue is not listed in the CISA KEV catalog. The likely attack requires a victim administrator to click a malicious link that submits a crafted POST request; thus the attack vector is web-based user interaction. While it does not provide remote code execution, the ability to hijack configuration settings can lead to unintentional content exclusion, possible compliance violations, and reduced control over the site’s behavior.

Generated by OpenCVE AI on April 22, 2026 at 09:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the mCatFilter plugin to the latest available version (post‑0.5.2).
  • If an upgrade is not possible immediately, configure the site to block administrative POST requests to the plugin’s settings endpoint, for example by adding firewall rules or .htaccess restrictions that limit POST access to admin users only.
  • Alternatively, temporarily deactivate the compute_post() hook by editing the plugin’s PHP file to comment out or remove the add_action('plugins_loaded', 'mcatfilter_compute_post'); line, thereby preventing automatic processing of POST data until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 09:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Chsxf
Chsxf mcatfilter
Wordpress
Wordpress wordpress
Vendors & Products Chsxf
Chsxf mcatfilter
Wordpress
Wordpress wordpress

Wed, 22 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description The mCatFilter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.5.2. This is due to the complete absence of nonce verification and capability checks in the compute_post() function, which processes settings updates. The compute_post() function is called in the plugin constructor on every page load via the plugins_loaded hook, and it directly processes $_POST data to modify plugin settings via update_option() without any CSRF token validation. This makes it possible for unauthenticated attackers to modify all plugin settings, including category exclusion rules, feed exclusion flags, and tag page exclusion flags, via a forged POST request, granted they can trick a site administrator into performing an action such as clicking a link.
Title mCatFilter <= 0.5.2 - Cross-Site Request Forgery via compute_post() Function
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Chsxf Mcatfilter
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-22T15:31:40.591Z

Reserved: 2026-03-13T15:29:31.027Z

Link: CVE-2026-4139

cve-icon Vulnrichment

Updated: 2026-04-22T15:25:49.922Z

cve-icon NVD

Status : Deferred

Published: 2026-04-22T09:16:24.707

Modified: 2026-04-22T20:22:50.570

Link: CVE-2026-4139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:44:07Z

Weaknesses