Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.3
Font Pairing Preview Plugin Allows Unauthenticated Settings Changes
CVE-2026-1086
Summary
The Font Pairing Preview For Landing Pages plugin for WordPress is at risk because an attacker could trick a site administrator into making changes to the plugin's settings without needing a password. This could result in unintended font pairing settings being applied to your website. To protect your site, update the plugin to a version that has fixed this issue.
Original title
The Font Pairing Preview For Landing Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing nonce validation on the...
Original description
The Font Pairing Preview For Landing Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's font pairing settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
nvd CVSS3.1
4.3
Vulnerability type
CWE-352
Cross-Site Request Forgery (CSRF)
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026