CVE-2026-1378
Received Received - Intake
CSRF Vulnerability in WP Posts Re-order Plugin Allows Settings Manipulation

Publication date: 2026-03-21

Last updated on: 2026-03-21

Assigner: Wordfence

Description
The WP Posts Re-order plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `cpt_plugin_options()` function. This makes it possible for unauthenticated attackers to update the plugin settings including capability, autosort, and adminsort settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-21
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wp_posts_re_order plugin to 1.0 (inc)
wordfence wp_posts_re_order to 1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The WP Posts Re-order plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 1.0. This occurs because the plugin's function `cpt_plugin_options()` lacks nonce validation, which is a security measure to verify requests.

Due to this missing validation, an attacker who is not authenticated can trick a site administrator into performing an action, such as clicking a malicious link, which then allows the attacker to update the plugin's settings without permission.

Specifically, the attacker can modify settings like capability, autosort, and adminsort by sending a forged request that the administrator unknowingly executes.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to change the configuration of the WP Posts Re-order plugin without your consent.

Since the attacker can update settings such as capability requirements and sorting options, they might weaken access controls or alter how posts are ordered on your WordPress site.

Although the vulnerability does not directly compromise data confidentiality or availability, it can lead to unauthorized changes in site behavior and potentially facilitate further attacks or misuse.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is due to missing nonce validation on the cpt_plugin_options() function in the WP Posts Re-order plugin, allowing unauthenticated attackers to update plugin settings via forged requests.'}, {'type': 'paragraph', 'content': "To detect exploitation attempts on your system or network, you can monitor HTTP requests targeting the plugin's settings update endpoint for suspicious POST requests that modify capability, autosort, or adminsort settings without proper authentication."}, {'type': 'paragraph', 'content': 'Since the plugin uses AJAX to save order data, you can look for unusual POST requests to the AJAX handler related to the plugin.'}, {'type': 'list_item', 'content': 'Use web server logs or network monitoring tools to filter POST requests containing parameters related to plugin settings changes.'}, {'type': 'list_item', 'content': 'Example command to search Apache logs for suspicious POST requests to the plugin settings page (adjust path as needed):'}, {'type': 'list_item', 'content': "grep -i 'POST' /var/log/apache2/access.log | grep 'wp-posts-re-order'"}, {'type': 'list_item', 'content': "Use WordPress debug or audit logs to check for unexpected changes to plugin options such as 'autosort', 'adminsort', or 'capability'."}, {'type': 'list_item', 'content': "If you have access to the WordPress database, query the options table for recent changes to 'wppro_options':"}, {'type': 'list_item', 'content': "SELECT * FROM wp_options WHERE option_name = 'wppro_options';"}] [2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately restrict access to the WP Posts Re-order plugin settings page to trusted administrators only.

Since the vulnerability arises from missing nonce validation, applying a patch or update that adds proper nonce checks to the cpt_plugin_options() function is critical.

If no patch is available yet, consider temporarily disabling or uninstalling the WP Posts Re-order plugin to prevent exploitation.

Additionally, educate site administrators to avoid clicking on suspicious links that could trigger forged requests.

  • Restrict plugin access by verifying user capabilities and limiting admin roles.
  • Monitor and block suspicious POST requests targeting the plugin settings.
  • Keep WordPress core and all plugins updated to the latest versions.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart