Dam Spam Vulnerability (Medium) – CVE-2026-2112

Dam Spam Vulnerability (Medium) – CVE-2026-2112

by | Feb 17, 2026 | Plugins

Attack Vectors

Dam Spam (WordPress plugin) versions up to and including 1.0.8 have a Medium-severity issue (CVSS 4.3) that can be exploited through Cross-Site Request Forgery (CSRF).

The attack path is straightforward: an unauthenticated attacker crafts a malicious request and then tricks a logged-in WordPress administrator into triggering it (for example, by clicking a link). Because the affected action occurs in the plugin’s cleanup page and lacks proper request verification, the forged request can be executed using the admin’s active session.

This means the attacker does not need a password, but they do need user interaction from someone with admin access.

Security Weakness

The root weakness in Dam Spam (≤ 1.0.8) is missing nonce verification for the pending comment deletion action on the plugin’s cleanup page. In WordPress terms, a nonce is a standard mechanism used to confirm that a request is legitimate and intentionally initiated by an authorized user.

Without this check, WordPress can’t reliably distinguish between an admin intentionally performing the cleanup action and an admin being unknowingly used as a “proxy” to execute a forged request. As a result, an attacker can cause deletion of pending comments if they can induce an admin to interact with the crafted content.

Reference: CVE-2026-2112

Technical or Business Impacts

The primary technical impact is arbitrary deletion of all pending comments. While the vulnerability does not indicate data theft or account takeover, it can still create real business disruption and reputational risk.

Business impacts may include lost leads or customer inquiries submitted as comments, reduced community engagement, and increased operational overhead to investigate “missing” submissions. For marketing teams, it can disrupt campaign workflows when comment-driven promotions, testimonials, or community moderation pipelines are in use.

From a governance and compliance standpoint, unplanned removal of user-submitted content may complicate recordkeeping expectations, internal review processes, or customer dispute handling—especially if your organization treats inbound website interactions as business records.

Remediation: Update Dam Spam to version 1.0.9 or newer (patched version). Source: Wordfence vulnerability record

Similar Attacks

CSRF-driven administrative actions are a common pattern in WordPress ecosystem incidents. Here are a few real examples to help contextualize the risk:

CVE-2015-9284 (WordPress core) — a CSRF issue that highlighted how administrative actions can be triggered when protective checks are missing or bypassed.

CVE-2018-6389 (WordPress) — widely discussed in the WordPress security community as an example of how web request handling weaknesses can become business-disrupting, even without direct data theft.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers