Keybase.io Verification Vulnerability (Medium) – CVE-2026-1072

Keybase.io Verification Vulnerability (Medium) – CVE-2026-1072

by | Feb 17, 2026 | Plugins

Attack Vectors

The Keybase.io Verification plugin for WordPress (slug: wp-keybase-verification) is affected by a Medium-severity Cross-Site Request Forgery (CSRF) vulnerability in versions 1.4.5 and earlier (CVE-2026-1072, CVSS 4.3). In practical terms, an attacker can attempt to change the plugin’s settings by getting a site administrator to click a crafted link or interact with a malicious page while logged into WordPress.

This is a “social engineering assisted” attack: the attacker does not need to log in, but they do need an administrator’s browser session to carry out the forged request. Common entry points include phishing emails, messages that impersonate vendors or internal staff, and links shared through social media or collaboration tools.

Security Weakness

The underlying weakness is missing nonce validation when updating plugin settings. In WordPress, a nonce is a standard safeguard that helps ensure that a settings change request is intentional and originates from an authorized, legitimate action inside the admin experience.

Without that check, an attacker can potentially submit a forged settings update request that the administrator’s browser will send “on their behalf” if they are logged in—allowing a change to the Keybase verification text even though the attacker is not authenticated.

Technical or Business Impacts

The immediate impact described for this issue is unauthorized modification of the Keybase verification text. While this may sound minor, it can create real business risk by undermining site integrity and trust signals—especially if your organization relies on verification text for brand authenticity, communications confidence, or public-facing credibility.

From a business perspective, any unauthorized change made through an administrator session can trigger brand and compliance concerns: confusion for customers and partners, potential reputational damage, increased support burden, and time spent on incident triage. It can also be a warning sign that administrative click-safety and governance controls need strengthening, since CSRF attacks often succeed through routine business workflows (email reviews, vendor links, and shared documents).

Remediation is straightforward: update Keybase.io Verification to version 1.4.6 or newer (patched). For reference, CVE details are available at CVE-2026-1072, and the source advisory is published by Wordfence.

Similar Attacks

CSRF-driven admin setting changes are a well-established web risk category. For broader context on how CSRF attacks work and why they matter to organizations, see OWASP: Cross-Site Request Forgery (CSRF).

Many enterprises also track CSRF as part of common web application weakness programs; see MITRE CWE-352: Cross-Site Request Forgery and MITRE CAPEC-62: Cross-Site Request Forgery for real-world examples of how these attacks are used to force unwanted actions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers