Plattform
wordpress
Komponente
cms-fuer-motorrad-werkstaetten
Behoben in
1.0.1
1.0.1
CVE-2026-6451 describes a Cross-Site Request Forgery (CSRF) vulnerability discovered in the cms-fuer-motorrad-werkstaetten plugin for WordPress. This flaw allows an attacker to perform unauthorized actions, specifically data deletion, on a user's behalf without their knowledge. The vulnerability impacts versions of the plugin up to 1.0.0, and a fix is expected to be released by the plugin developer.
The primary impact of CVE-2026-6451 is the potential for unauthorized data deletion within the WordPress site using the cms-fuer-motorrad-werkstaetten plugin. An attacker could craft malicious links or scripts that, when clicked by an authenticated user, would trigger the deletion of vehicles, contacts, suppliers, receipts, positions, catalogs, stock items, or catalog settings. This could lead to significant data loss, disruption of business operations, and potential reputational damage. The lack of nonce validation and capability checks makes exploitation relatively straightforward, particularly if the attacker can trick a user into clicking a malicious link.
CVE-2026-6451 was publicly disclosed on 2026-04-17. There are currently no known public proof-of-concept exploits available, but the vulnerability's simplicity suggests that one could be developed relatively easily. The vulnerability is not currently listed on CISA KEV, and there is no evidence of active exploitation campaigns. The CVSS score of 4.3 (Medium) reflects the potential impact and ease of exploitation.
WordPress websites utilizing the cms-fuer-motorrad-werkstaetten plugin, particularly those running versions prior to the patched release, are at risk. Shared hosting environments where multiple websites share the same server resources are also at increased risk, as a compromise on one site could potentially be leveraged to attack others.
• wordpress / composer / npm:
grep -r 'vehicles_cfmw_d_vehicle|contacts_cfmw_d_contact|suppliers_cfmw_d_supplier|receipts_cfmw_d_receipt|positions_cfmw_d_position|catalogs_cfmw_d_article|stock_cfmw_d_item|settings_cfmw_d_catalog' /var/www/html/wp-content/plugins/cms-fuer-motorrad-werkstaetten/• generic web:
curl -I https://example.com/wp-admin/admin-ajax.php?action=vehicles_cfmw_d_vehicle | grep -i '200 ok'disclosure
Exploit-Status
EPSS
0.01% (2% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-6451 is to upgrade the cms-fuer-motorrad-werkstaetten plugin to a version that includes the necessary nonce validation and capability checks. If upgrading is not immediately possible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to block requests to the vulnerable AJAX endpoints (vehiclescfmwdvehicle, contactscfmwdcontact, supplierscfmwdsupplier, receiptscfmwdreceipt, positionscfmwdposition, catalogscfmwdarticle, stockcfmwditem, and settingscfmwdcatalog) that lack proper authentication. Additionally, restrict access to the plugin's administrative interface to trusted users only. After upgrading, confirm the fix by attempting to access the vulnerable endpoints while logged in as a standard user and verifying that the actions are denied.
Kein bekannter Patch verfügbar. Bitte überprüfen Sie die Details der Schwachstelle eingehend und setzen Sie Risikominderungen basierend auf der Risikobereitschaft Ihrer Organisation um. Es kann am besten sein, die betroffene Software zu deinstallieren und eine Alternative zu finden.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-6451 is a Cross-Site Request Forgery (CSRF) vulnerability in the cms-fuer-motorrad-werkstaetten WordPress plugin, allowing attackers to delete data without authentication.
You are affected if your WordPress site uses the cms-fuer-motorrad-werkstaetten plugin and is running a version prior to the patched release.
Upgrade the cms-fuer-motorrad-werkstaetten plugin to the latest version that includes nonce validation and capability checks. Consider a WAF rule as a temporary workaround.
There is currently no evidence of active exploitation, but the vulnerability's simplicity suggests potential for future exploitation.
Refer to the plugin developer's website or WordPress plugin repository for the official advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.