Vulnerability Description
The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the 'publish_unpublish_popupbox' function that verifies a self-created nonce rather than one submitted in the request. This makes it possible for unauthenticated attackers to change the publish status of popups via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/ays-popup-box/tags/6.1.0/admin/partia
- https://plugins.trac.wordpress.org/browser/ays-popup-box/tags/6.1.0/includes/lis
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/585a9eb4-f394-4cb2-905
FAQ
What is CVE-2026-1165?
CVE-2026-1165 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the 'publish_unpublish_popup...
How severe is CVE-2026-1165?
CVE-2026-1165 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1165?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.