<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4021 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4021/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 00:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4021/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)</title><link>https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 00:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</guid><description>CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.</description><content:encoded><![CDATA[<p>The Contest Gallery plugin for WordPress, versions up to and including 28.1.5, is vulnerable to a critical authentication bypass (CVE-2026-4021). This vulnerability stems from how the <code>users-registry-check-after-email-or-pin-confirmation.php</code> script handles email confirmations, combined with an unauthenticated key-based login endpoint in <code>ajax-functions-frontend.php</code>.  If the <code>RegMailOptional=1</code> setting is enabled (non-default), an attacker can register a new user account with a specially…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>authentication-bypass</category><category>plugin-vulnerability</category><category>cve-2026-4021</category></item></channel></rss>