The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Fri, 22 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kasparsd
Kasparsd widget Context Wordpress Wordpress wordpress |
|
| Vendors & Products |
Kasparsd
Kasparsd widget Context Wordpress Wordpress wordpress |
Fri, 22 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Widget Context <= 1.3.3 - Cross-Site Request Forgery to Settings Update via 'wl' Parameter | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-05-22T07:50:25.128Z
Updated: 2026-05-22T07:50:25.128Z
Reserved: 2026-05-01T13:11:17.046Z
Link: CVE-2026-7615
No data.
Status : Received
Published: 2026-05-22T09:16:32.250
Modified: 2026-05-22T09:16:32.250
Link: CVE-2026-7615
No data.
ReportizFlow