Skip to content
CVSS 8.8 · HIGH

CVE-2026-3772

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possible for unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with attacker-controlled code via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.

View on NVD

Analysis

The WP Editor plugin for WordPress is vulnerable to a CSRF attack that allows unauthenticated attackers to overwrite arbitrary plugin and theme PHP files. If a site administrator is tricked into clicking a malicious link, an attacker can achieve full remote code execution (RCE) on the server.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-352

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 6.3%
EPSS: 2026-05-06

Technical description

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possible for unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with attacker-controlled code via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.

Published: 5/1/2026, 12:16:16 PM
Last modified: 5/1/2026, 3:26:24 PM

References

HomeEventsBlogResourcesTeam