<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3596 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3596/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 06:16:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3596/feed.xml" rel="self" type="application/rss+xml"/><item><title>Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</link><pubDate>Thu, 16 Apr 2026 06:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin for WordPress, versions 2.1.2 and earlier, contains a critical privilege escalation vulnerability (CVE-2026-3596). This flaw stems from an unauthenticated AJAX action, &lsquo;wp_ajax_nopriv_install-imprint&rsquo;, which is improperly secured. The corresponding function, <code>ink_pd_add_option()</code>, allows unauthenticated users to modify arbitrary WordPress options by sending POST requests. There are no nonce checks, capability checks, or input validation performed on the &lsquo;option&rsquo; and &lsquo;opt_value&rsquo; parameters, making it trivial to manipulate sensitive site settings. Successful exploitation allows attackers to grant themselves administrative privileges. This vulnerability poses a significant risk to any WordPress site using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the Riaxe Product Customizer plugin (&lt;= 2.1.2).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes the <code>action</code> parameter set to <code>install-imprint</code>, triggering the vulnerable AJAX action <code>wp_ajax_nopriv_install-imprint</code>.</li>
<li>The attacker sets the <code>option</code> parameter to <code>default_role</code> and the <code>opt_value</code> parameter to <code>administrator</code> within the POST request. This will change the default user role to administrator.</li>
<li>The attacker sets the <code>option</code> parameter to <code>users_can_register</code> and the <code>opt_value</code> parameter to <code>1</code> within the POST request. This enables user registration on the WordPress site.</li>
<li>The <code>ink_pd_add_option()</code> function executes, calling <code>delete_option()</code> and <code>add_option()</code> with the attacker-supplied values, effectively updating the WordPress options table.</li>
<li>The attacker registers a new user account on the WordPress site.</li>
<li>Because user registration is enabled and the default user role is set to administrator, the attacker&rsquo;s new account is granted administrator privileges, allowing full control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3596 allows unauthenticated attackers to gain complete control over a vulnerable WordPress website. This can lead to website defacement, data theft, malware distribution, and denial of service. Given the widespread use of WordPress, this vulnerability has the potential to affect a large number of websites across various sectors. A successful attack would result in the attacker having the same access as the original website administrator.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove the Riaxe Product Customizer plugin from WordPress installations if it is present. This will eliminate the attack vector (plugin removal).</li>
<li>Monitor web server logs (category: <code>webserver</code>, product: <code>linux</code> or <code>windows</code>) for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>install-imprint</code> using the Sigma rule provided below.</li>
<li>Consider implementing a Web Application Firewall (WAF) rule to block requests matching the exploit pattern described in the Attack Chain.</li>
<li>Review WordPress user accounts for any unauthorized administrators.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>cve-2026-3596</category><category>plugin</category></item></channel></rss>