プラットフォーム
wordpress
コンポーネント
set-bulk-post-categories
修正版
1.1.1
CVE-2026-1081 describes a Cross-Site Request Forgery (CSRF) vulnerability discovered in the Set Bulk Post Categories plugin for WordPress. This flaw allows unauthenticated attackers to manipulate post categories in bulk if they can trick a site administrator into clicking a malicious link. The vulnerability affects versions 0.0.0 through 1.1, and a patch is available.
The primary impact of this vulnerability is unauthorized modification of post categories within a WordPress site. An attacker could leverage this to alter the categorization of important content, potentially disrupting site navigation, SEO rankings, or even injecting malicious content. While requiring user interaction (tricking an administrator), the potential for widespread impact on a WordPress site's content integrity is significant. This vulnerability is similar to other CSRF flaws where an attacker can perform actions on behalf of an authenticated user without their knowledge.
CVE-2026-1081 was publicly disclosed on 2026-01-24. No public proof-of-concept (PoC) code has been identified at the time of writing. The EPSS score is pending evaluation. It is currently not listed on the CISA KEV catalog.
WordPress sites utilizing the Set Bulk Post Categories plugin, particularly those with administrative accounts that are regularly targeted by phishing or social engineering attacks, are at risk. Shared hosting environments where multiple WordPress sites share the same server resources are also potentially vulnerable, as a compromise on one site could lead to attacks against others.
• wordpress / composer / npm:
grep -r 'bulk_update_categories' /var/www/html/wp-content/plugins/set-bulk-post-categories/• generic web:
curl -I https://example.com/wp-admin/admin-post.php?action=set_bulk_post_categories_update | grep -i 'referer'disclosure
エクスプロイト状況
EPSS
0.01% (0% パーセンタイル)
CISA SSVC
CVSS ベクトル
The recommended mitigation is to immediately upgrade the Set Bulk Post Categories plugin to a version that addresses this vulnerability. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests lacking proper CSRF tokens for the bulk category update endpoint. Additionally, educate administrators about the risks of clicking on suspicious links and verify the authenticity of any requests before confirming them. After upgrading, confirm the fix by attempting a bulk category update as a non-authenticated user and verifying that the action is denied.
既知の修正パッチはありません。脆弱性の詳細を詳細に検討し、組織のリスク許容度に基づいて軽減策を講じてください。影響を受けるソフトウェアをアンインストールし、代替手段を見つけるのが最善かもしれません。
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-1081 is a Cross-Site Request Forgery (CSRF) vulnerability in the Set Bulk Post Categories WordPress plugin, allowing attackers to modify post categories via forged requests.
If you are using the Set Bulk Post Categories plugin in versions 0.0.0–1.1, you are potentially affected by this vulnerability.
Upgrade the Set Bulk Post Categories plugin to a patched version. As a temporary workaround, implement a WAF rule to block requests lacking proper CSRF tokens.
As of the current date, there are no confirmed reports of active exploitation of CVE-2026-1081.
Refer to the plugin developer's website or WordPress.org plugin repository for updates and advisories related to CVE-2026-1081.
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。