<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Account Switcher Plugin for WordPress &lt;= 1.0.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/account-switcher-plugin-for-wordpress--1.0.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 02:19:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/account-switcher-plugin-for-wordpress--1.0.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-6456 - WordPress Account Switcher Plugin Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6456-wordpress-privesc/</link><pubDate>Wed, 20 May 2026 02:19:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6456-wordpress-privesc/</guid><description>The Account Switcher plugin for WordPress is vulnerable to privilege escalation (CVE-2026-6456) due to a loose comparison and lack of validation on the `rememberLogin` REST API endpoint, allowing authenticated attackers to gain administrator privileges.</description><content:encoded><![CDATA[<p>The Account Switcher plugin for WordPress, in versions up to and including 1.0.2, contains a privilege escalation vulnerability (CVE-2026-6456). The vulnerability resides within the <code>rememberLogin</code> REST API endpoint at <code>app/RestAPI.php:111</code>. It stems from the use of a loose comparison (<code>!=</code>) instead of a strict comparison (<code>!==</code>) for secret validation, combined with the absence of any validation to ensure that the secret is non-empty. This allows an authenticated attacker with Subscriber-level access or higher to elevate their privileges to that of any other user, including an Administrator, by sending an empty <code>secret</code> parameter. All REST routes also lack proper capability checks due to <code>permission_callback =&gt; '__return_true'</code>, exacerbating the issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with Subscriber-level access or higher authenticates to the WordPress site.</li>
<li>The attacker identifies a target user account to escalate privileges to (e.g., an Administrator account).</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>rememberLogin</code> REST API endpoint.</li>
<li>The request includes an empty string for the <code>secret</code> parameter.</li>
<li>The server-side code at <code>app/RestAPI.php:111</code> performs a loose comparison (<code>'' != ''</code>), which evaluates to <code>false</code>.</li>
<li>Due to the lack of proper validation, this <code>false</code> result allows the execution to proceed, and <code>wp_set_auth_cookie()</code> is called with the target user&rsquo;s ID.</li>
<li>The attacker&rsquo;s session is now authenticated as the target user, granting them the target user&rsquo;s privileges, including Administrator.</li>
<li>The attacker can now perform any administrative action on the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6456 allows any authenticated user with at least Subscriber privileges to gain full administrative control of the WordPress site. This can lead to complete compromise of the website, including data theft, defacement, malware injection, and denial of service. The CVSS v3.1 base score is 8.8, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by the plugin vendor to upgrade to a version greater than 1.0.2, which addresses CVE-2026-6456.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6456 Exploitation Attempt</code> to monitor for malicious requests to the <code>rememberLogin</code> REST API endpoint with an empty secret parameter.</li>
<li>Review and audit all custom REST API endpoints in WordPress plugins to ensure proper authentication, authorization, and input validation are in place to prevent similar privilege escalation vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cve</category><category>web-application</category></item></channel></rss>