<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4119 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4119/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 09:16:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4119/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-create-db-tables-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 09:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-create-db-tables-auth-bypass/</guid><description>The Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.</description><content:encoded><![CDATA[<p>The Create DB Tables plugin, versions 1.2.1 and earlier, suffers from an authorization bypass vulnerability (CVE-2026-4119). This flaw stems from the plugin&rsquo;s failure to implement capability checks or nonce verification for its admin_post action hooks, specifically those responsible for creating (admin_post_add_table) and deleting (admin_post_delete_db_table) database tables. Because the admin_post hook only requires a user to be logged in, any authenticated user, including those with the lowest Subscriber role, can access these endpoints. This oversight allows malicious actors to create arbitrary database tables or, more critically, delete existing ones, including vital WordPress core tables. The vulnerability was published on 2026-04-22, and given the severity, defenders should immediately address this risk. The affected versions of the plugin should be updated or removed to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers an account on a vulnerable WordPress site, gaining Subscriber-level access.</li>
<li>The attacker crafts a POST request to <code>wp-admin/admin-post.php</code> with the action parameter set to <code>add_table</code> or <code>delete_db_table</code>.</li>
<li>The attacker provides the <code>db_table</code> parameter with the name of the table to be deleted, if exploiting the <code>delete_db_table</code> action.</li>
<li>The server processes the request without proper authorization checks, because <code>current_user_can()</code> and <code>wp_verify_nonce()</code> are missing.</li>
<li>The <code>cdbt_delete_db_table()</code> function executes a <code>DROP TABLE</code> SQL query based on the user-supplied <code>db_table</code> parameter.</li>
<li>If the attacker targets a critical WordPress core table like <code>wp_users</code> or <code>wp_options</code>, the site&rsquo;s functionality will be severely impacted.</li>
<li>Alternatively, if exploiting the <code>add_table</code> action, the <code>cdbt_create_new_table()</code> function executes a <code>CREATE TABLE</code> SQL query, creating an arbitrary database table.</li>
<li>Successful exploitation can lead to complete destruction of the WordPress installation or the introduction of malicious database tables.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any authenticated user to delete arbitrary database tables, including critical WordPress core tables. This can lead to complete site destruction and data loss. An attacker could delete the <code>wp_users</code> table, effectively locking out all administrators and other users, or delete the <code>wp_options</code> table, causing the site to revert to its default state or become completely unusable. The CVSS v3.1 base score for this vulnerability is 9.1, highlighting the critical nature of the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Create DB Tables plugin to a version higher than 1.2.1, where this vulnerability is patched.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-post.php</code> with <code>action=delete_db_table</code> or <code>action=add_table</code> (see rule: &ldquo;Detect Unauthorized DB Table Modification&rdquo;).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests to <code>wp-admin/admin-post.php</code> with the vulnerable actions unless originating from an administrator (see rule: &ldquo;WAF - Block Unauthorized DB Table Modification&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>authorization-bypass</category><category>plugin-vulnerability</category><category>cve-2026-4119</category></item></channel></rss>