True Ranker Vulnerability (Medium) – CVE-2026-1085

True Ranker Vulnerability (Medium) – CVE-2026-1085

by | Mar 6, 2026 | Plugins

Attack Vectors

True Ranker (WordPress plugin slug: seo-local-rank) versions 2.2.9 and below have a Medium severity vulnerability (CVSS 4.3, CVE-2026-1085) that can be triggered through Cross-Site Request Forgery (CSRF).

In practical terms, an unauthenticated attacker does not need access to your WordPress admin panel to initiate the attack. They only need to trick a logged-in site administrator into taking an action such as clicking a link or visiting a web page that silently sends a forged request.

The outcome described in the advisory is an unauthorized disconnection of the administrator’s True Ranker account. This is enabled by a missing verification check on a specific sign-out action.

Security Weakness

The issue stems from missing nonce validation on the plugin’s seolocalrank-signout action. Nonce checks are a common safeguard in WordPress to ensure that sensitive actions are intentionally initiated by an authorized user.

Without that safeguard, a request that looks “legitimate” to the site can be forged from outside your organization and still be accepted—so long as it is executed in the context of an administrator who is currently logged in.

This vulnerability is documented by Wordfence and applies to all versions up to and including 2.2.9, with no known patch available at the time of the advisory.

Technical or Business Impacts

While this vulnerability is rated Medium and does not indicate data theft, its primary business risk is operational disruption: the attacker can force a disconnect of the True Ranker account, potentially interrupting workflows and reporting tied to the plugin.

For marketing directors and executives, the immediate concern is loss of continuity and visibility. If local SEO tracking, rankings, or related dashboards depend on True Ranker being connected, a forced disconnect can create gaps in measurement, delayed decisions, and missed performance signals.

For compliance and risk teams, this is also a governance issue: an external party influencing an authenticated admin action can be viewed as a control weakness, particularly if the site is used in regulated marketing activities or if reporting must be reliable and auditable.

Recommended response: since there is no known patch, organizations should assess mitigations based on risk tolerance. The source advisory notes it may be best to uninstall the affected software and find a replacement. In the interim, reduce exposure by limiting who has admin access, reinforcing security awareness against phishing/lure links, and monitoring for unexpected plugin account disconnections.

Similar Attacks

CSRF has repeatedly been used to trigger unwanted actions by tricking logged-in administrators. Examples include:

Wordfence: Cross-Site Request Forgery (CSRF) overview and examples

PortSwigger Web Security Academy: CSRF explained

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers