REPORT / 01
Analysis Report · Folder Analysis cache/friendly-functions-for-welcart_1.2.5 → cache/friendly-functions-for-welcart_1.2.6 — CVE-2026-1208
Shared security patch analysis results
02 ·
Lifecycle actions
cancel · resume · skip · regenerate
03 ·
Share this analysis
copy link · embed report
03 ·
CVE Security Analysis & Writeups
ai-generated · per cve
Comprehensive security analysis generated by AI for each confirmed CVE match. Click on a CVE to view the detailed writeup including vulnerability background, technical details, patch analysis, and PoC guide.
CVE-2026-1208
NVD
AI-Generated Analysis
05 ·
Findings
filter · search · paginate
Showing 0 to 0 of 0 results
ffw_function_settings.php
AI: 1 vulnerabilities
1 true positive
CVE-2026-1208
--- cache/friendly-functions-for-welcart_1.2.5/ffw_function_settings.php 2026-01-24 00:24:45.666710290 +0000+++ cache/friendly-functions-for-welcart_1.2.6/ffw_function_settings.php 2026-01-24 00:26:28.105075523 +0000@@ -9,6 +9,12 @@ include_once(ABSPATH . 'wp-admin/includes/plugin.php'); if (is_plugin_active('usc-e-shop/usc-e-shop.php')): +//Nonceチェック+if(+ isset($_POST['submit_settings']) &&+ !check_admin_referer('ffw_settings_nonce')+) wp_die(__('Security check failed', 'text-domain'));+ /* 設定情報 */ //取得 $friendlyFunctionsForWelcartData = get_option('friendlyFunctionsForWelcartData');@@ -54,10 +60,6 @@ //設定保存時のメッセージ if(isset($_POST['submit_settings'])){- //Nonceチェック- if(!check_admin_referer('ffw_settings_nonce')){- wp_die(__('Security check failed', 'text-domain'));- } $saveMessage = '<div class="saveMessage updated"><p>'.sprintf(esc_html__('%s saved.', MAINICHI_WEB_THIS_PLUGIN_NAME), sanitize_text_field($_POST['submit_settings'])).'</p></div>'; // ~を保存しました。 } ?>
AI Analysis
Analyzing the security diff for `ffw_function_settings.php`:
Vulnerability Existed: yes
TRUE POSITIVE
[Cross-Site Request Forgery (CSRF)] - [CWE-352] - [ffw_function_settings.php] [Lines 12-16 vs 57-60]
Old Code:
```php
if(isset($_POST['submit_settings'])){
//Nonceチェック
if(!check_admin_referer('ffw_settings_nonce')){
wp_die(__('Security check failed', 'text-domain'));
}
```
Fixed Code:
```php
//Nonceチェック
if(
isset($_POST['submit_settings']) &&
!check_admin_referer('ffw_settings_nonce')
) wp_die(__('Security check failed', 'text-domain'));
```
Explanation:
The nonce verification check has been moved earlier in the execution flow (lines 12-16) before any POST data processing occurs, whereas previously it was only performed after `isset($_POST['submit_settings'])` was confirmed (line 57). While both implementations perform the nonce check, moving it earlier provides defense-in-depth by rejecting unauthorized requests sooner. The logical change from nested conditionals to a combined condition using `&&` is functionally equivalent but the earlier placement prevents potential race conditions or side effects from other POST processing that might occur before the nonce check. The original vulnerability (unprotected form submission) has been addressed, and the fix strengthens the security posture by checking the nonce at the earliest opportunity during the settings submission handling.
CVE Analysis Results:
CVE-2026-1208: Yes
View CVE Description
The Friendly Functions for Welcart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.5. This is due to missing or incorrect nonce validation on the settings page. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Showing 1 to 1 of 1 results