Vulnerability Description
The Inquiry Form to Posts or Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in version 1.0. This is due to missing nonce validation on the plugin settings update handler, combined with insufficient input sanitization on all user-supplied fields and missing output escaping when rendering stored values. The settings handler fires solely on the presence of `$_POST['inq_hidden'] == 'Y'` with no call to `check_admin_referer()` and no WordPress nonce anywhere in the form or handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request that tricks a logged-in Administrator into visiting a malicious page.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/tags/1
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/tags/1
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/tags/1
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/tags/1
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/trunk/
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/trunk/
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/trunk/
- https://plugins.trac.wordpress.org/browser/inquiry-form-to-posts-or-pages/trunk/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6abd3968-a8e7-4b40-bb7
FAQ
What is CVE-2026-6293?
CVE-2026-6293 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Inquiry Form to Posts or Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in version 1.0. This is due to missing nonce validation on th...
How severe is CVE-2026-6293?
CVE-2026-6293 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6293?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.