The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Widget Context <= 1.3.3 - Cross-Site Request Forgery to Settings Update via 'wl' Parameter | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-22T07:50:25.128Z
Reserved: 2026-05-01T13:11:17.046Z
Link: CVE-2026-7615
No data.
Status : Received
Published: 2026-05-22T09:16:32.250
Modified: 2026-05-22T09:16:32.250
Link: CVE-2026-7615
No data.
OpenCVE Enrichment
Updated: 2026-05-22T09:30:32Z
Weaknesses