CVE-2026-4131
Received Received - Intake
CSRF Vulnerability in WP Responsive Popup Plugin Allows Settings Manipulation

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: Wordfence

Description
The WP Responsive Popup + Optin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 1.4. This is due to the settings form on the admin page (wpo_admin_page.php) lacking nonce generation (wp_nonce_field) and verification (wp_verify_nonce/check_admin_referer). This makes it possible for unauthenticated attackers to update all plugin settings including the 'wpo_image_url' parameter via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wp_responsive_popup wp_responsive_popup to 1.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The WP Responsive Popup + Optin plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 1.4. This occurs because the settings form on the admin page does not generate or verify security nonces, which are tokens used to confirm that requests come from legitimate users. Without these protections, an attacker can trick a site administrator into performing unintended actions, such as changing plugin settings, by sending a forged request.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to update all plugin settings by tricking an administrator into clicking a malicious link or performing a specific action. This can lead to unauthorized changes such as modifying the 'wpo_image_url' parameter, potentially altering the website's behavior or appearance. The impact includes partial compromise of confidentiality and integrity of the plugin settings, but it does not affect availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the WP Responsive Popup + Optin plugin to a version later than 1.4 where the issue is fixed.

Additionally, as a temporary measure, restrict access to the plugin's admin settings page to trusted administrators only and avoid clicking on suspicious links that could trigger forged requests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart