MMA Call Tracking Vulnerability (Medium) – CVE-2026-1215

MMA Call Tracking Vulnerability (Medium) – CVE-2026-1215

by | Feb 10, 2026 | Plugins

Attack Vectors

The WordPress plugin MMA Call Tracking (slug: mma-call-tracking) is affected by a Medium severity vulnerability (CVSS 4.3) that allows Cross-Site Request Forgery (CSRF) against plugin settings in versions up to and including 2.3.15.

In practical business terms, this can happen when an attacker convinces a logged-in administrator to interact with a crafted webpage or link. The attacker does not need to log into your site; instead, they rely on normal browser behavior while an admin is authenticated. If the administrator is tricked into triggering the forged request, the plugin’s call tracking configuration settings may be modified without the admin intending to approve the change.

Security Weakness

The issue stems from missing nonce validation when saving configuration on the mma_call_tracking_menu admin page. Nonce checks are a common WordPress control used to ensure that a settings change request is intentional and originates from the legitimate admin session flow.

Because this validation is missing, a forged request can be accepted by the site while an administrator is logged in, enabling unauthorized changes to settings. This vulnerability is tracked as CVE-2026-1215.

Technical or Business Impacts

Even though this vulnerability is not described as exposing data confidentiality or causing downtime, it can still create meaningful business risk because it targets marketing-critical configuration. If call tracking settings are altered, it can affect lead attribution, campaign measurement, and reporting accuracy—directly influencing budget decisions, ROI assessments, and executive dashboards.

For compliance and governance teams, unauthorized configuration changes can also undermine auditability and change-control expectations, especially if marketing analytics are used for regulated reporting or if your organization requires approvals for tracking-related configuration changes.

Remediation guidance indicates no known patch is available at this time. Based on your organization’s risk tolerance, consider mitigation steps such as uninstalling the affected software and selecting a replacement, tightening administrative access, and reinforcing admin security awareness to reduce the likelihood of an administrator being successfully tricked into executing a malicious link.

Similar Attacks

CSRF-style attacks and admin-targeted social engineering are commonly used to force unintended changes in web applications and plugins. Relevant examples include:

Cloudflare: What is Cross-Site Request Forgery (CSRF)?

OWASP: Cross-Site Request Forgery (CSRF)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers