Back to VulnFeed / CVE-2026-3772
root@hackertop:~/vulnfeed/CVE-2026-3772#
CVE-2026-3772 MEDIUM CSRF ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

benjaminprojas WP Editor Plugin up to 1.2.9.2 on WordPress add_plugins_page/add_themes_page cross-site request forgery

WP Editor Plugin 20d ago Impact pending confirmation
LIFECYCLE
6.5 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as problematic, was found in benjaminprojas WP Editor Plugin up to 1.2.9.2 on WordPress (WordPress Plugin). Affected is the function add_plugins_page/add_themes_page. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
CWE is classifying the issue as CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Impact: This is going to have an impact on integrity.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-3772 · CVSS 6.5 · Active Threat