<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AudioIgniter Plugin for WordPress &lt;= 2.0.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/audioigniter-plugin-for-wordpress--2.0.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 22 May 2026 09:18:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/audioigniter-plugin-for-wordpress--2.0.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>AudioIgniter WordPress Plugin Vulnerable to Insecure Direct Object Reference (CVE-2026-8679)</title><link>https://feed.craftedsignal.io/briefs/2026-05-audioigniter-idor/</link><pubDate>Fri, 22 May 2026 09:18:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-audioigniter-idor/</guid><description>The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference (CVE-2026-8679) in versions up to 2.0.2, allowing unauthenticated attackers to view track metadata of any playlist, regardless of its status.</description><content:encoded><![CDATA[<p>The AudioIgniter plugin for WordPress, in versions up to and including 2.0.2, suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2026-8679. This flaw resides within the <code>handle_playlist_endpoint()</code> function, which is hooked to <code>template_redirect</code>. The function accepts a user-controlled playlist ID either through the <code>audioigniter_playlist_id</code> query variable or via the <code>/audioigniter/playlist/{id}/</code> rewrite rule. The vulnerability stems from the lack of authentication, capability, or post status checks within this function, only validating the post type. Consequently, unauthenticated attackers can retrieve sensitive track metadata, including titles, artists, audio URLs, buy links, download URLs, and cover images, for any playlist on the site, even those marked as draft, private, pending, or trashed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the AudioIgniter plugin (&lt;= 2.0.2).</li>
<li>The attacker crafts a malicious URL targeting the <code>/audioigniter/playlist/{id}/</code> endpoint or by providing the <code>audioigniter_playlist_id</code> query parameter.</li>
<li>The attacker guesses or discovers the ID of a playlist on the targeted WordPress site. This could be achieved through brute-force or by examining publicly accessible playlist pages.</li>
<li>The attacker sends an HTTP GET request to the crafted URL, including the targeted playlist ID.</li>
<li>The <code>handle_playlist_endpoint()</code> function processes the request without proper authorization checks.</li>
<li>The function retrieves track metadata associated with the specified playlist ID from the WordPress database.</li>
<li>The metadata, including titles, artists, audio URLs, buy links, download URLs, and cover images, is returned to the attacker in the HTTP response.</li>
<li>The attacker gains unauthorized access to sensitive playlist information, even for playlists that should be restricted.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8679 allows unauthenticated attackers to access sensitive track metadata associated with any playlist on the vulnerable WordPress site. This includes information about draft, private, or trashed playlists that should not be publicly accessible. The exposure of audio URLs and download URLs could lead to unauthorized access and distribution of copyrighted content. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity. The number of affected sites is dependent on the adoption rate of the vulnerable AudioIgniter plugin version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AudioIgniter Playlist IDOR Attempt via URL</code> to identify suspicious requests to the <code>/audioigniter/playlist/{id}/</code> endpoint (see &ldquo;rules&rdquo; section).</li>
<li>Deploy the Sigma rule <code>Detect AudioIgniter Playlist IDOR Attempt via Query Parameter</code> to identify suspicious requests using the <code>audioigniter_playlist_id</code> query parameter (see &ldquo;rules&rdquo; section).</li>
<li>Upgrade the AudioIgniter plugin to a version greater than 2.0.2 to patch CVE-2026-8679.</li>
<li>Monitor web server logs for requests to the <code>/audioigniter/playlist/{id}/</code> endpoint or using the <code>audioigniter_playlist_id</code> query parameter with unusual playlist IDs (see &ldquo;references&rdquo; section for URL).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>idor</category><category>wordpress</category><category>plugin</category><category>cve-2026-8679</category><category>vulnerability</category></item></channel></rss>