SEATT: Simple Event Attendance Vulnerability (Medium) – CVE-2026-1983

SEATT: Simple Event Attendance Vulnerability (Medium) – CVE-2026-1983

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-1983 affects the WordPress plugin SEATT: Simple Event Attendance (slug: simple-event-attendance) in all versions up to and including 1.5.0. The issue is a Medium-severity Cross-Site Request Forgery (CSRF) vulnerability (CVSS 4.3).

In practical terms, an attacker does not need to log in to your site to attempt this. Instead, they rely on social engineering: getting an administrator to click a link or interact with content that triggers a hidden, forged request. If that administrator is currently logged into WordPress, the site may process the request as if it were legitimate.

This specific CSRF risk targets the plugin’s event deletion capability, meaning an attacker’s goal is to cause the removal of events without the admin intentionally approving that action.

Security Weakness

The core weakness is missing nonce validation on the event deletion functionality in SEATT: Simple Event Attendance through version 1.5.0. In WordPress, nonces are a common safeguard used to confirm that a sensitive action (like deleting content) was intentionally initiated by an authorized user.

Without this validation, the site may accept a deletion request that was initiated externally (for example, from an email link or a third-party webpage), as long as an administrator is tricked into performing an action that submits the forged request.

Because there is no known patch available at this time, organizations should treat this as a business decision: either accept the residual risk with mitigations, or remove the affected plugin and replace it based on risk tolerance and operational needs.

Technical or Business Impacts

The direct impact of CVE-2026-1983 is unauthorized deletion of events. While the CVSS vector indicates no confidentiality impact and a limited integrity impact, the business consequences can still be meaningful—especially for organizations that rely on event listings for marketing performance, lead generation, registrations, and customer communication.

Potential business risks include lost registrations or attendance due to missing events, brand and trust damage when customers cannot find promised events, and operational disruption for marketing and events teams forced into emergency restoration and communications.

For compliance and governance stakeholders, this can translate into process risk: unauthorized changes to public-facing information and potential breakdowns in approval workflows. If your organization uses events as part of regulated communications or documented campaigns, you may need to assess whether unexpected deletions could trigger internal reporting or incident-response procedures.

Given the Medium severity and the lack of a known patch, consider mitigations aligned to your environment (for example, uninstalling the plugin, restricting administrative access, and reinforcing staff awareness about suspicious links) and document the decision for auditability. For official details, see the CVE record: https://www.cve.org/CVERecord?id=CVE-2026-1983.

Similar Attacks

CSRF has been used in real-world incidents to trick authenticated users into performing unintended actions. Examples include:

Cross-site request forgery (CSRF) overview and notable history (Wikipedia)

OWASP: Cross-Site Request Forgery (CSRF)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers