CVE-2026-32344
Received Received - Intake
Cross-Site Request Forgery in Corpiva ≀ 1.0.96 Allows Unauthorized Actions

Publication date: 2026-03-13

Last updated on: 2026-03-17

Assigner: Patchstack

Description
Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva allows Cross Site Request Forgery.This issue affects Corpiva: from n/a through <= 1.0.96.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
desertthemes corpiva to 1.0.96 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32344 is a Cross Site Request Forgery (CSRF) vulnerability affecting the WordPress Corpiva Theme versions up to and including 1.0.96.

This vulnerability allows a malicious actor to trick higher privileged users into executing unwanted actions while authenticated, such as by clicking a malicious link, visiting a crafted page, or submitting a form.

The issue requires user interaction and the involvement of a privileged user to be exploited.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized actions being performed by privileged users without their intention, potentially compromising the integrity of the affected system.

However, it is classified with a low severity score (CVSS 4.3) and is considered a low priority issue.

Exploitation requires user interaction and privileged user involvement, limiting the risk.

Users are advised to update to version 1.0.97 of the Corpiva Theme to mitigate this risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a Cross Site Request Forgery (CSRF) issue affecting the WordPress Corpiva Theme up to version 1.0.96. Detection typically involves verifying the version of the Corpiva Theme installed on your WordPress site.

You can check the theme version by accessing your WordPress dashboard or by using command line tools to inspect the theme files.

  • Use WP-CLI to check the theme version: wp theme list --status=active
  • Manually check the style.css file in the Corpiva theme directory for the version number: cat wp-content/themes/corpiva/style.css | grep Version

Since this is a CSRF vulnerability, network detection is difficult because the exploit requires user interaction and privileged user authentication. Monitoring for unusual POST requests or suspicious user activity might help but no specific commands are provided.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the Corpiva Theme to version 1.0.97 or later, where this CSRF vulnerability has been patched.

Additionally, ensure that privileged users are cautious about clicking on unknown links or visiting untrusted websites while authenticated to the WordPress site.

Implementing general CSRF protections such as using anti-CSRF tokens and limiting user privileges can also help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart