CVE-2026-4131
CSRF Vulnerability in WP Responsive Popup Plugin Allows Settings Manipulation
Publication date: 2026-04-22
Last updated on: 2026-04-22
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wp_responsive_popup | wp_responsive_popup | to 1.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The WP Responsive Popup + Optin plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 1.4. This occurs because the settings form on the admin page does not generate or verify security nonces, which are tokens used to confirm that requests come from legitimate users. Without these protections, an attacker can trick a site administrator into performing unintended actions, such as changing plugin settings, by sending a forged request.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to update all plugin settings by tricking an administrator into clicking a malicious link or performing a specific action. This can lead to unauthorized changes such as modifying the 'wpo_image_url' parameter, potentially altering the website's behavior or appearance. The impact includes partial compromise of confidentiality and integrity of the plugin settings, but it does not affect availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the WP Responsive Popup + Optin plugin to a version later than 1.4 where the issue is fixed.
Additionally, as a temporary measure, restrict access to the plugin's admin settings page to trusted administrators only and avoid clicking on suspicious links that could trigger forged requests.