CVE-2026-32343
Received Received - Intake
Cross-Site Request Forgery in Easy Table of Contents

Publication date: 2026-03-13

Last updated on: 2026-03-16

Assigner: Patchstack

Description
Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 Easy Table of Contents easy-table-of-contents allows Cross Site Request Forgery.This issue affects Easy Table of Contents: from n/a through <= 2.0.80.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
magazine3 easy_table_of_contents to 2.0.80 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32343 is a Cross Site Request Forgery (CSRF) vulnerability affecting the WordPress Easy Table of Contents Plugin versions up to and including 2.0.80.

This vulnerability allows a malicious actor to trick higher privileged users into executing unwanted actions while authenticated, such as by clicking a crafted link, visiting a malicious page, or submitting a form.

The issue requires user interaction and the involvement of a privileged user to be exploited.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized actions being executed under the session of a privileged user if they are tricked into interacting with malicious content.

Although the severity is considered low (CVSS score of 4.3), it can still result in broken access control where attackers perform actions without proper authorization.

Users are advised to update to version 2.0.81 or later to mitigate this risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is a Cross Site Request Forgery (CSRF) affecting the Easy Table of Contents WordPress plugin up to version 2.0.80. Detection typically involves verifying the plugin version installed on your WordPress site.'}, {'type': 'paragraph', 'content': 'There are no specific network or system commands provided to detect this vulnerability directly.'}, {'type': 'paragraph', 'content': 'To check the plugin version, you can use WordPress CLI commands such as:'}, {'type': 'list_item', 'content': 'wp plugin list --status=active'}, {'type': 'list_item', 'content': "Look for 'easy-table-of-contents' and verify if the version is 2.0.80 or lower."}, {'type': 'paragraph', 'content': 'If the plugin version is vulnerable, it indicates the presence of the vulnerability.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the Easy Table of Contents plugin to version 2.0.81 or later, where the vulnerability has been patched.

Additionally, enabling auto-updates for the plugin can help ensure that future vulnerabilities are addressed promptly.

Since this is a CSRF vulnerability requiring user interaction and privileged user involvement, educating users to avoid clicking suspicious links or visiting untrusted pages while authenticated can also reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart