UNKNOWN (0.0)
    Plugin

    Cross-Site Request Forgery Vulnerability in Purchase Button For Affiliate Link Plugin

    Published Date: 3/7/2026
    CVE ID: CVE-2026-1073

    Summary

    The Purchase Button For Affiliate Link plugin for WordPress is affected by a Cross-Site Request Forgery (CSRF) vulnerability in all versions up to and including 1.0.2. The lack of nonce validation on its settings page allows unauthenticated attackers to potentially alter plugin settings with manipulated requests.

    Vulnerability Details

    This vulnerability arises from missing CSRF protection in the form of nonce checks in the `inc/purchase-btn-options-page.php` file. Without proper nonce validation, a malicious user could craft a request that a site administrator might unknowingly execute if they are logged into the WordPress site and interact with the attacker's content, such as by clicking on a malicious link. The attack leverages social engineering to coerce administrators into performing the desired action, leading to unauthorized settings changes. Typically, the consequence of such an attack can vary but generally affects the site's configuration, leading to potential unauthorized actions or redirection of visitor traffic. While the severity is marked as unknown, the potential impact on site administration and user trust is notable.

    Recommendations

    Add CSRF protection by implementing nonce checks on all forms that accept user input, especially those that modify settings. Site administrators should exercise caution when interacting with unfamiliar links or content that could potentially lead to CSRF attacks.

    Available Fixes

    Last Updated: 3/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More