CVE-2026-34904
Received Received - Intake
Cross-Site Request Forgery in Analytify Social Share Buttons

Publication date: 2026-04-07

Last updated on: 2026-04-07

Assigner: Patchstack

Description
Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-07
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
analytify simple_social_media_share_buttons to 6.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34904 is a Cross Site Request Forgery (CSRF) vulnerability found in the WordPress Simple Social Media Share Buttons plugin versions up to and including 6.2.0.

This vulnerability allows attackers to trick privileged users into executing unwanted actions while they are authenticated. This can happen if the user clicks on malicious links, visits crafted web pages, or submits malicious forms.

Although the attacker does not need to be authenticated, the attack requires interaction by a privileged user to be successful.

The vulnerability is classified under OWASP Top 10 category A1: Broken Access Control and has a CVSS severity score of 7.5, indicating a moderate risk.

The issue was fixed in version 6.2.1 of the plugin, and users are advised to update to this version or later to mitigate the vulnerability.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to force privileged users of the Simple Social Media Share Buttons plugin to perform unintended actions without their consent.

Such actions could compromise the integrity, confidentiality, and availability of your website or its data, as indicated by the CVSS score which rates the impact on confidentiality, integrity, and availability as high.

However, the overall impact is considered low priority and it is unlikely to be exploited with significant effect.

To avoid this impact, it is recommended to update the plugin to version 6.2.1 or later.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-34904 vulnerability, you should update the Simple Social Media Share Buttons WordPress plugin to version 6.2.1 or later.

Using the auto-update feature provided by Patchstack for vulnerable plugins can also help provide rapid protection.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of the CVE-2026-34904 vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart