CVE-2026-6391
Cross-Site Request Forgery in Sentence To SEO WordPress Plugin
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sentence_to_seo | plugin | to 1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Sentence To SEO plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 1.0. This occurs because the plugin's create_admin_page() function lacks proper nonce validation, which is a security measure to verify requests.
As a result, an attacker who is not authenticated can trick a site administrator into performing an action, such as clicking a malicious link, which then allows the attacker to inject harmful web scripts and change the plugin's settings without permission.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in the Sentence To SEO plugin allows unauthenticated attackers to perform Cross-Site Request Forgery (CSRF) attacks, potentially injecting malicious scripts and altering plugin settings by tricking site administrators.
Such unauthorized changes and potential data manipulation could lead to breaches of data integrity and confidentiality, which are critical aspects of compliance with standards like GDPR and HIPAA.
If exploited, this vulnerability might result in unauthorized access or modification of sensitive information, thereby risking non-compliance with regulations that require protection of personal and health data.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized changes in your WordPress plugin settings and the injection of malicious scripts. Such actions can compromise the security and integrity of your website.
- Attackers can manipulate plugin settings without your consent.
- Malicious scripts injected could lead to further exploitation or data compromise.
- Since the attack requires tricking an administrator, it exploits user interaction, making it harder to detect.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability exists in all versions up to and including 1.0 of the Sentence To SEO plugin for WordPress due to missing or incorrect nonce validation in the create_admin_page() function.
To mitigate this vulnerability, you should update the Sentence To SEO plugin to a version later than 1.0 where the issue is fixed.
Additionally, as a precaution, avoid clicking on suspicious links or performing actions from untrusted sources that could trigger forged requests.