CVE-2026-1392
CSRF Vulnerability in SR WP Minify HTML Plugin Allows Settings Modification
Publication date: 2026-03-21
Last updated on: 2026-03-21
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sr_wp_minify_html | sr_wp_minify_html | to 2.1 (inc) |
| sr_wp_minify_html | plugin | to 2.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The SR WP Minify HTML plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 2.1. This vulnerability exists because the plugin's function sr_minify_html_theme() does not validate a security nonce, which is a token used to verify that a request comes from a legitimate source.
As a result, an attacker who is not authenticated can trick a site administrator into performing an action, such as clicking on a malicious link, which causes the plugin settings to be updated without the administrator's consent.
How can this vulnerability impact me? :
This vulnerability allows an unauthenticated attacker to change the settings of the SR WP Minify HTML plugin by tricking an administrator into executing a forged request. This could lead to unauthorized changes in how HTML minification is applied on the WordPress site.
While the vulnerability does not directly compromise confidentiality or availability, it can impact the integrity of the plugin's configuration, potentially causing unexpected behavior or performance issues on the website.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves the SR WP Minify HTML WordPress plugin lacking nonce validation on the sr_minify_html_theme() function, allowing unauthenticated attackers to update plugin settings via forged requests. Detection would involve monitoring for suspicious POST requests targeting the AJAX handler wp_ajax_sr_minify_html_theme, especially those that attempt to toggle minification settings without proper authentication.'}, {'type': 'paragraph', 'content': 'Since the plugin uses an AJAX POST request to the admin-ajax.php endpoint with the action sr_minify_html_theme, you can detect potential exploitation attempts by inspecting web server logs or using network monitoring tools to filter for POST requests containing this action.'}, {'type': 'list_item', 'content': 'Use command-line tools like grep or tcpdump to search for suspicious POST requests to admin-ajax.php with the action parameter sr_minify_html_theme.'}, {'type': 'list_item', 'content': "Example grep command on web server logs: grep 'action=sr_minify_html_theme' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "Use curl to test if the endpoint accepts POST requests without nonce validation (only on authorized test environments): curl -X POST -d 'action=sr_minify_html_theme&template=your_theme' https://yourwordpresssite.com/wp-admin/admin-ajax.php"}] [2]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the SR WP Minify HTML plugin to a version that includes nonce validation on the sr_minify_html_theme() function once such an update is available.
Until an update is available, consider disabling the plugin or disabling the minification feature per theme to prevent exploitation via the vulnerable AJAX handler.
Additionally, restrict access to the WordPress admin-ajax.php endpoint by implementing web application firewall (WAF) rules or IP restrictions to limit unauthorized POST requests.
- Disable the SR WP Minify HTML plugin temporarily from the WordPress admin dashboard.
- If disabling the entire plugin is not feasible, disable minification for active themes via the plugin settings page.
- Implement WAF rules to block unauthorized POST requests to admin-ajax.php with the action sr_minify_html_theme.