Description
The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-05-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Widget Context plugin for WordPress has a missing or incorrectly implemented nonce check in its settings update routine, enabling a cross‑site request forgery attack. An attacker who can trick an authenticated administrator into visiting a crafted URL can submit a forged POST request to the /wp-admin/widgets.php endpoint and change the visibility context of widgets stored in the WordPress options table. This results in the attacker's ability to alter which users see which widgets, potentially exposing hidden content or degrading user experience.

Affected Systems

The vulnerability affects all installations of the Widget Context plugin by kasparsd running version 1.3.3 or earlier. Any WordPress site that has not upgraded beyond that version is exposed.

Risk and Exploitability

The vulnerability has a CVSS score of 4.3, indicating moderate impact and moderate likelihood of exploitation. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Because the flaw relies on CSRF, an attacker must first compromise the victim’s browser session and convince a site administrator to act, which raises the effort and skill required. Nonetheless, the potential for unauthorized configuration changes warrants prompt remediation.

Generated by OpenCVE AI on May 22, 2026 at 09:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest version of the Widget Context plugin that includes proper CSRF protection
  • If an upgrade cannot be deployed immediately, add an additional CSRF nonce check to the admin settings page or use a security plugin that enforces nonce validation on all admin posts
  • Restrict access to the WordPress admin area by IP address or enable two‑factor authentication to reduce the window of opportunity for forged requests

Generated by OpenCVE AI on May 22, 2026 at 09:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Kasparsd
Kasparsd widget Context
Wordpress
Wordpress wordpress
Vendors & Products Kasparsd
Kasparsd widget Context
Wordpress
Wordpress wordpress

Fri, 22 May 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Widget Context <= 1.3.3 - Cross-Site Request Forgery to Settings Update via 'wl' Parameter
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Kasparsd Widget Context
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-23T02:27:03.512Z

Reserved: 2026-05-01T13:11:17.046Z

Link: CVE-2026-7615

cve-icon Vulnrichment

Updated: 2026-05-23T02:26:56.349Z

cve-icon NVD

Status : Received

Published: 2026-05-22T09:16:32.250

Modified: 2026-05-22T09:16:32.250

Link: CVE-2026-7615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T12:37:53Z

Weaknesses