Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)
The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.
The Riaxe Product Customizer plugin for WordPress, versions 2.1.2 and earlier, contains a critical privilege escalation vulnerability (CVE-2026-3596). This flaw stems from an unauthenticated AJAX action, ‘wp_ajax_nopriv_install-imprint’, which is improperly secured. The corresponding function, ink_pd_add_option(), allows unauthenticated users to modify arbitrary WordPress options by sending POST requests. There are no nonce checks, capability checks, or input validation performed on the ‘option’ and ‘opt_value’ parameters, making it trivial to manipulate sensitive site settings. Successful exploitation allows attackers to grant themselves administrative privileges. This vulnerability poses a significant risk to any WordPress site using the affected plugin.
Attack Chain
- An unauthenticated attacker identifies a WordPress site using a vulnerable version of the Riaxe Product Customizer plugin (<= 2.1.2).
- The attacker crafts a malicious HTTP POST request targeting the
/wp-admin/admin-ajax.phpendpoint. - The POST request includes the
actionparameter set toinstall-imprint, triggering the vulnerable AJAX actionwp_ajax_nopriv_install-imprint. - The attacker sets the
optionparameter todefault_roleand theopt_valueparameter toadministratorwithin the POST request. This will change the default user role to administrator. - The attacker sets the
optionparameter tousers_can_registerand theopt_valueparameter to1within the POST request. This enables user registration on the WordPress site. - The
ink_pd_add_option()function executes, callingdelete_option()andadd_option()with the attacker-supplied values, effectively updating the WordPress options table. - The attacker registers a new user account on the WordPress site.
- Because user registration is enabled and the default user role is set to administrator, the attacker’s new account is granted administrator privileges, allowing full control over the WordPress site.
Impact
Successful exploitation of CVE-2026-3596 allows unauthenticated attackers to gain complete control over a vulnerable WordPress website. This can lead to website defacement, data theft, malware distribution, and denial of service. Given the widespread use of WordPress, this vulnerability has the potential to affect a large number of websites across various sectors. A successful attack would result in the attacker having the same access as the original website administrator.
Recommendation
- Immediately remove the Riaxe Product Customizer plugin from WordPress installations if it is present. This will eliminate the attack vector (plugin removal).
- Monitor web server logs (category:
webserver, product:linuxorwindows) for POST requests to/wp-admin/admin-ajax.phpwith theactionparameter set toinstall-imprintusing the Sigma rule provided below. - Consider implementing a Web Application Firewall (WAF) rule to block requests matching the exploit pattern described in the Attack Chain.
- Review WordPress user accounts for any unauthorized administrators.
Detection coverage 2
Detect Riaxe Product Customizer Privilege Escalation Attempt
criticalDetects attempts to exploit the privilege escalation vulnerability (CVE-2026-3596) in the Riaxe Product Customizer plugin by monitoring POST requests to admin-ajax.php with the install-imprint action.
Detect Unauthorized User Registration After CVE-2026-3596 Exploitation
mediumDetects potentially unauthorized user registration events following exploitation of the Riaxe Product Customizer vulnerability. This assumes that attackers will enable user registration to create an admin account.
Detection queries are kept inside the platform. Get full rules →