UNKNOWN (0.0)
    Plugin

    Cross-Site Request Forgery Vulnerability in True Ranker Plugin

    Published Date: 3/7/2026
    CVE ID: CVE-2026-1085

    Summary

    The True Ranker plugin for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to and including 2.2.9. This issue allows unauthenticated attackers to disconnect the administrator's True Ranker account by tricking them into making a crafted request.

    Vulnerability Details

    The vulnerability resides in the handling of the `seolocalrank-signout` action within the True Ranker plugin, due to a lack of nonce validation on this action. Nonce validation is crucial in WordPress to protect against CSRF attacks, which leverage the trust a site has for a user's browser. By exploiting this, an attacker can generate a crafted request and trick a logged-in site administrator into executing unwanted actions, such as signing out from their True Ranker account, without their explicit consent. This could be done by embedding a malicious link or script in an email or on an external site. Although this vulnerability does not directly grant attackers privileged actions or access to sensitive data, disruptions in service and administrative controls can occur, potentially impacting site SEO management. Correct nonce implementation would prevent this type of attack by verifying the intent of the action performed by the user.

    Recommendations

    Site administrators should be cautious of unsolicited links and ensure all plugin interactions occur over secure, verified sessions. It's recommended to implement Content Security Policy (CSP) headers to mitigate CSRF possibilities and educate users on identifying phishing attempts.

    Available Fixes

    Last Updated: 3/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More