Purchase Button For Affiliate Link Vulnerability (Medium) – CVE-202…

Purchase Button For Affiliate Link Vulnerability (Medium) – CVE-202…

by | Mar 6, 2026 | Plugins

Attack Vectors

Purchase Button For Affiliate Link (slug: purchase-button) has a Medium-severity vulnerability (CVSS 4.3, CVE-2026-1073) that can be exploited through Cross-Site Request Forgery (CSRF). This attack relies on user interaction: an attacker must trick a logged-in administrator into clicking a link or submitting a request while they are authenticated to the WordPress admin area.

In practical terms, this can happen through phishing emails, deceptive “review this document” messages, compromised vendor inboxes, or links embedded in ads and social messages. The attacker does not need to log into your site, but they do need your administrator to unknowingly trigger the forged request.

Security Weakness

The issue affects all versions up to and including 1.0.2. The plugin’s settings update handler is missing a standard validation check (“nonce” validation) on the settings page form handler in inc/purchase-btn-options-page.php. According to the published advisory, this gap allows unauthenticated attackers to submit a forged request that changes plugin settings when an administrator is coerced into performing an action such as clicking a link.

Remediation note: there is no known patch available at this time. Organizations should weigh risk and apply mitigations that fit their environment and tolerance, including potentially uninstalling the plugin and selecting a replacement.

Technical or Business Impacts

This vulnerability is categorized as Medium because it can change configuration (integrity impact is limited), but it does not inherently enable data theft or site outage based on the published CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). Even so, settings changes can carry real business consequences.

Business impacts that matter to marketing and leadership teams include: misdirected affiliate traffic, altered purchase button behavior that reduces conversion rates, brand trust damage if users are routed unexpectedly, and compliance or audit concerns if site controls are shown to be susceptible to administrative “click-based” manipulation. For organizations with strict change-control requirements, unauthorized settings changes—regardless of scale—can create reporting obligations and internal response costs.

Given the absence of a vendor patch, consider mitigation steps aligned with your operating model: minimize the number of admin accounts, reinforce phishing-resistant workflows, review plugin necessity and ownership, and evaluate whether replacing or removing Purchase Button For Affiliate Link is the most cost-effective risk decision.

Similar Attacks

CSRF-style attacks that rely on tricking an authenticated user have been widely observed across web platforms. For context, here are a few real-world examples of web-based “click-driven” exploitation patterns (not necessarily WordPress-specific):

Cross-site request forgery (CSRF) overview and history
OWASP: Cross-Site Request Forgery (CSRF)
CISA Cybersecurity Advisories (examples of user-interaction-based attack campaigns)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers