Atomic Edge analysis of CVE-2026-1085 (metadata-based):
The vulnerability is a Cross-Site Request Forgery (CSRF) in the True Ranker WordPress plugin. The root cause is missing nonce validation on the `seolocalrank-signout` action. WordPress plugins typically implement AJAX handlers via `wp_ajax_{action}` hooks. The plugin likely registers an AJAX handler for authenticated users (administrators) without verifying the WordPress nonce token.
Exploitation requires an attacker to craft a malicious link or form that submits a POST request to `/wp-admin/admin-ajax.php`. The request must contain `action=seolocalrank-signout`. An administrator must be tricked into visiting the attacker-controlled page while authenticated to WordPress. The browser automatically sends the administrator’s session cookies with the forged request, executing the disconnection action.
The fix requires adding a nonce check using `wp_verify_nonce()` before processing the signout logic. The plugin should verify the `_wpnonce` parameter matches the expected value for that specific action.
Impact is limited to disconnecting the administrator’s True Ranker account. This disrupts the plugin’s functionality but does not compromise the WordPress site directly. The CVSS score of 4.3 reflects the low confidentiality and availability impact, with integrity impact limited to account linkage status. Atomic Edge research confirms this is a classic CSRF vulnerability in a WordPress AJAX endpoint.







