Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-4139

CVE-2026-4139: mCatFilter WordPress Plugin CSRF Vulnerability

CVE-2026-4139 is a Cross-Site Request Forgery flaw in the mCatFilter WordPress plugin that lets attackers modify plugin settings. This article covers the technical details, affected versions, impact, and mitigation.

Published: April 23, 2026

CVE-2026-4139 Overview

The mCatFilter plugin for WordPress contains a Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to and including 0.5.2. This security flaw stems from the complete absence of nonce verification and capability checks in the compute_post() function, which is responsible for processing settings updates. The vulnerable function is called in the plugin constructor on every page load via the plugins_loaded hook and directly processes $_POST data to modify plugin settings through update_option() without any CSRF token validation.

Critical Impact

Unauthenticated attackers can modify all mCatFilter plugin settings, including category exclusion rules, feed exclusion flags, and tag page exclusion flags, by tricking a site administrator into clicking a malicious link.

Affected Products

  • mCatFilter WordPress Plugin version 0.5.2 and earlier
  • WordPress sites with mCatFilter installed
  • All WordPress deployments using vulnerable mCatFilter versions

Discovery Timeline

  • 2026-04-22 - CVE-2026-4139 published to NVD
  • 2026-04-22 - Last updated in NVD database

Technical Details for CVE-2026-4139

Vulnerability Analysis

This CSRF vulnerability exists because the mCatFilter plugin fails to implement fundamental WordPress security mechanisms. The compute_post() function processes settings changes without verifying that the request originated from a legitimate administrator session. WordPress provides nonce tokens specifically to prevent CSRF attacks, but the plugin authors neglected to implement this protection entirely.

The vulnerability is particularly concerning because compute_post() is invoked during the plugins_loaded action hook, which fires on every WordPress page load. This means the vulnerable code path is always active whenever the plugin is enabled, creating a persistent attack surface. An attacker only needs to craft a malicious HTML page containing a hidden form that submits POST data to the target WordPress site.

Root Cause

The root cause of CVE-2026-4139 is the absence of both nonce verification and capability checks in the settings processing logic. WordPress best practices dictate that any function modifying options should:

  1. Verify a valid nonce token using wp_verify_nonce() or check_admin_referer()
  2. Confirm the user has appropriate capabilities using current_user_can()

The compute_post() function skips both of these critical checks, directly processing $_POST data and calling update_option() to persist changes to the database. This allows any HTTP POST request to the WordPress site to potentially modify plugin settings if the request is made in the context of an authenticated administrator's browser session.

Attack Vector

An attacker exploits this vulnerability through a network-based attack requiring user interaction. The typical attack flow involves:

  1. The attacker creates a malicious webpage containing a hidden HTML form that targets the victim's WordPress site
  2. The form is pre-populated with POST parameters that correspond to the mCatFilter settings fields
  3. The attacker social-engineers a WordPress administrator into visiting the malicious page
  4. Upon page load, JavaScript automatically submits the hidden form, or the victim is tricked into clicking a button
  5. The administrator's browser sends the POST request with their authenticated session cookies
  6. The compute_post() function processes the malicious POST data without CSRF validation
  7. Plugin settings are modified according to the attacker's payload

The vulnerable code can be examined in the WordPress Plugin Code Reference and related source files at line 320 and line 339.

Detection Methods for CVE-2026-4139

Indicators of Compromise

  • Unexpected changes to mCatFilter plugin settings without administrator action
  • Modified category exclusion rules, feed exclusion flags, or tag page exclusion settings
  • HTTP POST requests to WordPress pages originating from external referrers
  • Administrator reports of clicking suspicious links prior to settings changes

Detection Strategies

  • Monitor WordPress wp_options table for unexpected modifications to mCatFilter-related options
  • Review web server access logs for POST requests to WordPress pages with external or suspicious Referer headers
  • Implement Content Security Policy headers to restrict form submission targets
  • Deploy web application firewall rules to detect CSRF attack patterns

Monitoring Recommendations

  • Enable WordPress audit logging to track all plugin settings changes with user attribution
  • Configure alerts for option modifications occurring outside of the WordPress admin dashboard context
  • Regularly review mCatFilter settings to ensure they match expected configurations
  • Monitor for suspicious administrator activity patterns that may indicate successful CSRF exploitation

How to Mitigate CVE-2026-4139

Immediate Actions Required

  • Check if a patched version of mCatFilter is available and update immediately
  • If no patch is available, consider temporarily deactivating the mCatFilter plugin until a fix is released
  • Review current mCatFilter settings to identify any unauthorized modifications
  • Educate site administrators about the risks of clicking untrusted links while logged into WordPress

Patch Information

Review the Wordfence Vulnerability Report for the latest patch status and remediation guidance. Monitor the plugin's WordPress repository for updated versions that include proper nonce verification and capability checks in the compute_post() function.

Workarounds

  • Implement a web application firewall rule to block POST requests to WordPress from external referrers
  • Use browser extensions or security headers to prevent cross-origin form submissions to the WordPress admin
  • Limit WordPress administrator access to trusted IP addresses to reduce the attack surface
  • Consider using alternative category filtering plugins with proper CSRF protection until a patch is available
bash
# Add to .htaccess to block POST requests with external referrers (Apache)
RewriteEngine On
RewriteCond %{REQUEST_METHOD} POST
RewriteCond %{HTTP_REFERER} !^https?://(www\.)?yourdomain\.com [NC]
RewriteCond %{REQUEST_URI} !^/wp-(cron|trackback)\.php [NC]
RewriteRule ^ - [F,L]

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeCSRF

  • Vendor/TechWordpress

  • SeverityMEDIUM

  • CVSS Score4.3

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-352
  • Technical References
  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • WordPress Plugin Code Reference

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-6451: WordPress CMS für Motorrad Plugin CSRF Flaw

  • CVE-2026-6396: WordPress 3F Plugin CSRF Vulnerability

  • CVE-2026-4131: WP Responsive Popup + Optin CSRF Vulnerability

  • CVE-2026-4133: TextP2P Texting Widget CSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English