UNKNOWN (0.0)
    Plugin

    Cross-Site Request Forgery Vulnerability in Font Pairing Preview for Landing Pages Plugin

    Published Date: 3/7/2026
    CVE ID: CVE-2026-1086

    Summary

    The Font Pairing Preview For Landing Pages WordPress plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.3. This vulnerability allows attackers to modify plugin settings by tricking an authenticated administrator into clicking on a malicious link.

    Vulnerability Details

    The vulnerability in the Font Pairing Preview For Landing Pages plugin is caused by a lack of nonce validation on the settings update functionality. Nonces are critical in WordPress to ensure that requests made to sensitive endpoints are legitimate and originate from an expected user session. Without this protection, the plugin is susceptible to CSRF attacks, where an attacker can craft a special request that, when executed by an authenticated administrator, will alter the plugin’s font settings without their knowledge. This kind of attack requires social engineering tactics, such as sending an email with a link to the administrator. Successfully exploiting this flaw can lead to unexpected changes in the site’s appearance and potential reputational damage.

    Recommendations

    To mitigate this vulnerability, implement nonce verification in the plugin’s settings update functionalities. Admins should be cautious about clicking on unsolicited links, especially from untrusted sources. Additionally, consider deploying additional security plugins that offer CSRF protection as a further safeguard.

    Available Fixes

    Last Updated: 3/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More