CVE-2026-1392
Received Received - Intake
CSRF Vulnerability in SR WP Minify HTML Plugin Allows Settings Modification

Publication date: 2026-03-21

Last updated on: 2026-03-21

Assigner: Wordfence

Description
The SR WP Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing nonce validation on the sr_minify_html_theme() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-21
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sr_wp_minify_html sr_wp_minify_html to 2.1 (inc)
sr_wp_minify_html plugin to 2.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The SR WP Minify HTML plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 2.1. This vulnerability exists because the plugin's function sr_minify_html_theme() does not validate a security nonce, which is a token used to verify that a request comes from a legitimate source.

As a result, an attacker who is not authenticated can trick a site administrator into performing an action, such as clicking on a malicious link, which causes the plugin settings to be updated without the administrator's consent.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker to change the settings of the SR WP Minify HTML plugin by tricking an administrator into executing a forged request. This could lead to unauthorized changes in how HTML minification is applied on the WordPress site.

While the vulnerability does not directly compromise confidentiality or availability, it can impact the integrity of the plugin's configuration, potentially causing unexpected behavior or performance issues on the website.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves the SR WP Minify HTML WordPress plugin lacking nonce validation on the sr_minify_html_theme() function, allowing unauthenticated attackers to update plugin settings via forged requests. Detection would involve monitoring for suspicious POST requests targeting the AJAX handler wp_ajax_sr_minify_html_theme, especially those that attempt to toggle minification settings without proper authentication.'}, {'type': 'paragraph', 'content': 'Since the plugin uses an AJAX POST request to the admin-ajax.php endpoint with the action sr_minify_html_theme, you can detect potential exploitation attempts by inspecting web server logs or using network monitoring tools to filter for POST requests containing this action.'}, {'type': 'list_item', 'content': 'Use command-line tools like grep or tcpdump to search for suspicious POST requests to admin-ajax.php with the action parameter sr_minify_html_theme.'}, {'type': 'list_item', 'content': "Example grep command on web server logs: grep 'action=sr_minify_html_theme' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "Use curl to test if the endpoint accepts POST requests without nonce validation (only on authorized test environments): curl -X POST -d 'action=sr_minify_html_theme&template=your_theme' https://yourwordpresssite.com/wp-admin/admin-ajax.php"}] [2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the SR WP Minify HTML plugin to a version that includes nonce validation on the sr_minify_html_theme() function once such an update is available.

Until an update is available, consider disabling the plugin or disabling the minification feature per theme to prevent exploitation via the vulnerable AJAX handler.

Additionally, restrict access to the WordPress admin-ajax.php endpoint by implementing web application firewall (WAF) rules or IP restrictions to limit unauthorized POST requests.

  • Disable the SR WP Minify HTML plugin temporarily from the WordPress admin dashboard.
  • If disabling the entire plugin is not feasible, disable minification for active themes via the plugin settings page.
  • Implement WAF rules to block unauthorized POST requests to admin-ajax.php with the action sr_minify_html_theme.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart