The Alfie – Feed Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the alfie_manage() function which handles feed deletion via the 'delete' GET parameter. This makes it possible for unauthenticated attackers to delete arbitrary plugin feed data (from alfie_colindex, alfie_producten, alfie_reactions, and alfie_searchproduct tables) via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2026-4070
MEDIUMNVD 4.34.3—
EchelonGraph scoreHIGH confidence
Score 4.3 from GitHub Security Advisory published 2026-05-22. NVD baseline CVSS 4.3; sources differ by 0.0.
Triggered by: GitHub Security Advisory CVSS
Sources: ghsa, nvd
4.3
- CVSS v3
- 4.3
- EG Score
- 4.3(high)
- EPSS
- 0.3%
- KEV
- Not listed
Published
May 22, 2026
Last Modified
May 22, 2026
References (5)
- security@wordfencehttps://plugins.trac.wordpress.org/browser/alfie-the-productfeedtool-wp-plugin/tags/1.2.1/include/alfie-manage.php#L58
- security@wordfencehttps://plugins.trac.wordpress.org/browser/alfie-the-productfeedtool-wp-plugin/tags/1.2.1/include/alfie-manage.php#L60
- security@wordfencehttps://plugins.trac.wordpress.org/browser/alfie-the-productfeedtool-wp-plugin/trunk/include/alfie-manage.php#L58
- security@wordfencehttps://plugins.trac.wordpress.org/browser/alfie-the-productfeedtool-wp-plugin/trunk/include/alfie-manage.php#L60
- security@wordfencehttps://www.wordfence.com/threat-intel/vulnerabilities/id/af36719a-8f7d-46dc-a697-cfcbb08e45e2?source=cve
Frequently asked(5)
What is CVE-2026-4070?
CVE-2026-4070 is a medium vulnerability published on May 22, 2026. The Alfie – Feed Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the alfiemanage() function which handles feed deletion via the 'delete' GET parameter. This makes it possible for…
When was CVE-2026-4070 disclosed?
CVE-2026-4070 was first published in the National Vulnerability Database on May 22, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
Is CVE-2026-4070 actively exploited?
CVE-2026-4070 is not currently on CISA's Known Exploited Vulnerabilities catalog. FIRST EPSS estimates a 0.3% percentile likelihood of exploitation in the next 30 days — higher percentiles indicate greater predicted risk.
What is the CVSS score of CVE-2026-4070?
CVE-2026-4070 has a CVSS v3 base score of 4.3 (NVD).
How do I remediate CVE-2026-4070?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-4070, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.
Dependency Blast Radius
See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-4070
Is Your Infrastructure Affected by CVE-2026-4070?
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.