<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</guid><description>The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.</description><content:encoded><![CDATA[<p>CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>scan_video</code> parameter as an SSRF entry point.</li>
<li>The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the <code>scan_video</code> parameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname).</li>
<li>The WordPress server receives the malicious request.</li>
<li>The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the <code>scan_video</code> parameter.</li>
<li>The WordPress server makes a request to the internal resource.</li>
<li>The response from the internal resource is received by the WordPress server.</li>
<li>The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker&rsquo;s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PixelYourSite Pro SSRF Attempts</code> to monitor for exploitation attempts targeting the <code>scan_video</code> parameter.</li>
<li>Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>wordpress</category><category>plugin</category></item><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item><item><title>OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-plugin-vuln/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-plugin-vuln/</guid><description>OpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.4.8 are susceptible to a critical vulnerability (CVE-2026-42428) due to the lack of integrity verification for downloaded plugin archives. This flaw allows a malicious actor to install crafted or tampered plugin packages onto a user&rsquo;s system without any validation or warning. Successful exploitation grants the attacker the ability to compromise the OpenClaw assistant environment, potentially leading to arbitrary code execution, data theft, or other malicious activities. The vulnerability was reported on April 28, 2026, and poses a significant risk to users who rely on OpenClaw for their assistant needs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target running a vulnerable version of OpenClaw (prior to 2026.4.8).</li>
<li>The attacker crafts a malicious plugin archive containing malicious code or scripts.</li>
<li>The attacker entices the user to download the malicious plugin archive, potentially through social engineering or by hosting it on a compromised website.</li>
<li>The user installs the malicious plugin archive via OpenClaw&rsquo;s plugin installation mechanism.</li>
<li>Due to the missing integrity check, OpenClaw installs the plugin without verifying its authenticity or integrity.</li>
<li>The malicious plugin is loaded and executed within the OpenClaw environment.</li>
<li>The attacker gains control over the OpenClaw assistant environment and executes malicious code.</li>
<li>The attacker performs unauthorized actions, such as stealing data, installing malware, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42428 allows attackers to compromise the local OpenClaw assistant environment. The lack of integrity verification means a malicious plugin can execute arbitrary code, potentially leading to data theft, system compromise, or further lateral movement within the network. The severity is high due to the potential for complete system compromise and the relative ease of exploitation, requiring only that a user install a malicious plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch CVE-2026-42428.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious OpenClaw Plugin Installation&rdquo; to detect the installation of unsigned or suspicious plugins.</li>
<li>Educate users about the risks of installing plugins from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>plugin</category><category>integrity</category><category>CVE-2026-42428</category></item><item><title>WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</link><pubDate>Wed, 22 Apr 2026 09:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</guid><description>The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.</description><content:encoded><![CDATA[<p>The HTTP Headers plugin for WordPress, versions up to and including 1.19.2, is vulnerable to remote code execution (RCE) due to a file path manipulation vulnerability (CVE-2026-4132). This vulnerability stems from the plugin&rsquo;s insufficient validation of the &lsquo;hh_htpasswd_path&rsquo; option, which controls the location of the .htpasswd file. Furthermore, the &lsquo;hh_www_authenticate_user&rsquo; option, used for setting the username for HTTP Basic Authentication, lacks proper sanitization. This allows attackers with administrator privileges to specify an arbitrary file path for the htpasswd file and inject unsanitized content into it. By crafting a malicious username containing PHP code and setting the htpasswd path to a web-accessible directory, an attacker can execute arbitrary code on the server. This exploit requires administrator-level access to the WordPress dashboard.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the WordPress dashboard with administrator privileges.</li>
<li>The attacker navigates to the HTTP Headers plugin settings page.</li>
<li>The attacker modifies the &lsquo;hh_htpasswd_path&rsquo; option, setting it to a web-accessible directory (e.g., <code>/var/www/html/wp-content/uploads/.shell.php</code>).</li>
<li>The attacker modifies the &lsquo;hh_www_authenticate_user&rsquo; option, injecting PHP code into the username field (e.g., <code>&lt;?php system($_GET['cmd']); ?&gt;</code>).</li>
<li>The <code>apache_auth_credentials()</code> function uses sprintf to combine the malicious username with a SHA hash, creating a crafted htpasswd entry.</li>
<li>The <code>update_auth_credentials()</code> function then writes the crafted content, including the injected PHP code, to the attacker-controlled file path using <code>file_put_contents()</code>.</li>
<li>The attacker accesses the newly created PHP file via a web browser (e.g., <code>http://example.com/wp-content/uploads/.shell.php?cmd=id</code>).</li>
<li>The injected PHP code executes, allowing the attacker to run arbitrary commands on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants the attacker remote code execution on the affected WordPress server. This can lead to complete compromise of the server, including data theft, website defacement, malware deployment, and further attacks against internal networks. Given the widespread use of WordPress and its plugins, a successful exploit could impact a large number of websites and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the HTTP Headers plugin to a patched version (if available) to remediate CVE-2026-4132.</li>
<li>Monitor web server logs for requests to unusual file paths that match the &lsquo;hh_htpasswd_path&rsquo; setting specified in the plugin configuration to detect potential exploitation attempts.</li>
<li>Implement the Sigma rule to detect file creation events in web-accessible directories with PHP extensions that are triggered by the web server process.</li>
<li>Restrict access to the WordPress administrator dashboard to only trusted individuals and enforce strong password policies to prevent unauthorized access to plugin settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category><category>cve-2026-4132</category></item><item><title>OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-boundary/</link><pubDate>Tue, 21 Apr 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-boundary/</guid><description>OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.2 is vulnerable to an improper trust boundary issue. This vulnerability allows an attacker to achieve in-process code execution by exploiting the way OpenClaw handles workspace channel shadows. Specifically, an attacker can clone a workspace and include a malicious plugin. This plugin claims a bundled channel ID, which results in the execution of untrusted code during the built-in channel setup and login process, even before the plugin is explicitly trusted by the user. This poses a significant risk as it bypasses normal trust mechanisms within OpenClaw.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker clones a legitimate OpenClaw workspace.</li>
<li>Attacker crafts a malicious plugin designed to exploit the trust boundary vulnerability.</li>
<li>The malicious plugin is configured to claim a bundled channel ID that OpenClaw uses for built-in channels.</li>
<li>The cloned workspace, including the malicious plugin, is distributed to a target user.</li>
<li>The target user opens the cloned workspace in a vulnerable version of OpenClaw (before 2026.4.2).</li>
<li>During the workspace loading and channel setup process, OpenClaw incorrectly trusts the malicious plugin due to the claimed channel ID.</li>
<li>The malicious plugin executes arbitrary code within the OpenClaw process.</li>
<li>The attacker gains control or compromises the user&rsquo;s OpenClaw session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41295 leads to arbitrary code execution within the OpenClaw application. An attacker can leverage this to potentially steal sensitive information, modify workspace data, or escalate privileges on the affected system. The vulnerability impacts all OpenClaw users running versions prior to 2026.4.2 who open a maliciously crafted workspace. The impact is severe, as it allows for immediate code execution without explicit user consent or trust of the malicious plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.2 or later to patch CVE-2026-41295.</li>
<li>Monitor for the creation and loading of OpenClaw plugins, specifically those claiming bundled channel IDs, using a process creation rule with a focus on command-line arguments.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted plugins within OpenClaw to mitigate the risk of malicious plugin execution.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>code-execution</category><category>trust-boundary</category><category>plugin</category></item><item><title>Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</link><pubDate>Mon, 20 Apr 2026 20:35:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, versions 3.4.4 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-5478). This flaw stems from the plugin&rsquo;s improper handling of the <code>old_files</code> parameter within form submissions. Specifically, the plugin trusts attacker-controlled data as legitimate server-side upload state and insecurely converts URLs into local filesystem paths without adequate sanitization. This lack of input validation enables unauthenticated attackers to inject path traversal sequences, leading to the disclosure of sensitive files like <code>wp-config.php</code>, which contains database credentials and authentication salts. Furthermore, the flawed path resolution is utilized in a post-email cleanup routine, resulting in arbitrary file deletion via the <code>unlink()</code> function, potentially causing a denial-of-service condition. Successful exploitation requires a form with a file-upload or image-upload field and the &ldquo;store entry information&rdquo; feature disabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP POST request to a WordPress page containing an Everest Forms form with a file upload field.</li>
<li>The attacker includes the <code>old_files</code> parameter in the POST data, injecting a path traversal payload (e.g., <code>../../../../wp-config.php</code>) into its value.</li>
<li>The WordPress application processes the form submission, and the Everest Forms plugin extracts the <code>old_files</code> parameter.</li>
<li>The plugin&rsquo;s flawed logic converts the attacker-supplied URL into a local file system path using regex-based string replacement without canonicalization or directory boundary enforcement.</li>
<li>The plugin attaches the resolved file (e.g., <code>/var/www/wordpress/../../../../wp-config.php</code>) to the notification email.</li>
<li>After sending the notification email, the post-email cleanup routine utilizes the same flawed path resolution to determine the file to delete.</li>
<li>The <code>unlink()</code> function is called on the resolved path, leading to the deletion of the targeted file (e.g., <code>wp-config.php</code>).</li>
<li>The attacker gains access to sensitive information (database credentials, salts) or causes a denial of service by deleting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5478 allows unauthenticated attackers to read arbitrary files on the WordPress server, potentially exposing sensitive information like database credentials and authentication salts stored in <code>wp-config.php</code>. This could lead to full site compromise, including data theft, defacement, or further malicious activities. Furthermore, the ability to delete arbitrary files enables attackers to cause a denial-of-service condition by removing critical system or application files. The impact is significant as it affects all versions of the Everest Forms plugin up to and including 3.4.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to a version higher than 3.4.4 to patch CVE-2026-5478.</li>
<li>Deploy the Sigma rule &ldquo;Detect Everest Forms Arbitrary File Read Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enable web server logging to capture HTTP POST requests, which are crucial for detecting path traversal attempts (cs-uri-query, cs-method in webserver logs).</li>
<li>Monitor file deletion events on the WordPress server, especially those initiated by the web server user, using a file integrity monitoring (FIM) solution (file_event logs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>cve-2026-5478</category></item><item><title>WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</link><pubDate>Fri, 17 Apr 2026 17:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</guid><description>The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The WP Customer Area plugin, a popular WordPress plugin, is susceptible to an arbitrary file read and deletion vulnerability. This flaw, identified as CVE-2026-3464, resides within the &lsquo;ajax_attach_file&rsquo; function and stems from inadequate file path validation. All versions of the plugin up to and including 8.3.4 are affected. The vulnerability enables authenticated attackers with minimal privileges (e.g., Subscriber), granted access by an administrator, to read arbitrary files on the server, potentially exposing sensitive data. Attackers can also delete arbitrary files, which, in certain cases (such as deleting <code>wp-config.php</code>), can pave the way for remote code execution. This vulnerability poses a significant risk to WordPress websites utilizing the WP Customer Area plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site with the WP Customer Area plugin enabled, with privileges granted by an administrator (e.g., as a Subscriber).</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;ajax_attach_file&rsquo; function.</li>
<li>The crafted request includes a manipulated file path, bypassing input validation.</li>
<li>The plugin, failing to properly sanitize the file path, attempts to read or delete the file specified in the malicious request.</li>
<li>If reading, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>If deleting, the targeted file is removed from the server.</li>
<li>If the attacker targets a sensitive file, such as <code>wp-config.php</code>, and successfully deletes it, the WordPress installation becomes unstable and potentially allows for re-installation and control by the attacker.</li>
<li>The attacker exploits the instability to achieve remote code execution, potentially installing a web shell or other malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3464) allows attackers to read sensitive files, potentially including database credentials, API keys, and other confidential information. Moreover, the ability to delete arbitrary files can lead to denial-of-service conditions or, more critically, remote code execution. The number of affected websites is potentially large, given the popularity of the WP Customer Area plugin. A successful attack can result in complete compromise of the WordPress website and its underlying server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Customer Area plugin to a version greater than 8.3.4 to patch CVE-2026-3464.</li>
<li>Monitor web server logs for requests containing suspicious file paths targeting the &lsquo;ajax_attach_file&rsquo; function (see Sigma rule below).</li>
<li>Implement stricter file path validation on the web server to prevent arbitrary file access.</li>
<li>Apply the provided Sigma rules to your SIEM to detect and alert on malicious attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>rce</category></item><item><title>Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)</title><link>https://feed.craftedsignal.io/briefs/2026-04-plisio-auth-bypass/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-plisio-auth-bypass/</guid><description>A missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.</description><content:encoded><![CDATA[<p>CVE-2026-6372 is a missing authorization vulnerability affecting the Plisio Accept Cryptocurrencies with Plisio WordPress plugin, specifically versions from initial releases through 2.0.5. Discovered by Patchstack, the vulnerability stems from incorrectly configured access control security levels within the plugin. An attacker can exploit this flaw to bypass payment verification processes, potentially leading to unauthorized transactions or manipulation of payment-related functionalities. Given the increasing adoption of cryptocurrency payments, this vulnerability presents a significant risk to e-commerce sites using the affected plugin. Successful exploitation can result in financial losses and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the vulnerable Plisio plugin (version &lt;= 2.0.5).</li>
<li>Attacker analyzes the plugin&rsquo;s code or intercepts network traffic to identify the specific endpoint or function responsible for payment verification lacking proper authorization checks.</li>
<li>The attacker crafts a malicious HTTP request to the vulnerable endpoint, bypassing the intended authentication or authorization mechanisms.</li>
<li>The crafted request modifies payment parameters (e.g., amount, recipient) without proper validation.</li>
<li>The modified request is sent to the server, which processes it without correctly verifying the user&rsquo;s authority.</li>
<li>The server updates the payment status, marking it as &ldquo;paid&rdquo; or &ldquo;verified,&rdquo; even though the actual payment might be incomplete, altered, or entirely missing.</li>
<li>The WordPress site delivers goods or services based on the fraudulently verified payment status.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6372 allows attackers to bypass payment verification processes in e-commerce sites using the Plisio Accept Cryptocurrencies plugin. This can lead to financial losses for the site owner due to unauthorized transactions. The vulnerability affects all installations using versions up to and including 2.0.5. Given the potential for widespread impact on any site accepting cryptocurrency via this plugin, this issue represents a high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Plisio Accept Cryptocurrencies with Plisio plugin to a version greater than 2.0.5 to patch CVE-2026-6372.</li>
<li>Deploy the Sigma rule <code>Detect Plisio Payment Bypass Attempt</code> to monitor for exploit attempts targeting the vulnerable endpoint.</li>
<li>Examine web server logs for suspicious POST requests to payment processing endpoints associated with the Plisio plugin, filtering for unexpected parameter modifications (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>payment-bypass</category><category>cve-2026-6372</category></item><item><title>Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</link><pubDate>Thu, 16 Apr 2026 06:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin, a WordPress plugin, is susceptible to SQL Injection attacks. This vulnerability resides within the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint, specifically through the &lsquo;options&rsquo; parameter keys nested within the &lsquo;product_data&rsquo;. All versions of the plugin up to and including 2.1.2 are affected. Due to insufficient input sanitization and inadequate preparation of SQL queries, unauthenticated attackers can inject malicious SQL code. Successful exploitation enables attackers to execute arbitrary SQL queries, potentially leading to sensitive data extraction. This poses a significant risk to WordPress sites utilizing the affected plugin, as attackers could gain access to user credentials, financial information, or other confidential data stored in the database. Defenders should prioritize patching or removing the plugin to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;=2.1.2) of the Riaxe Product Customizer plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint.</li>
<li>The crafted request includes a &lsquo;product_data&rsquo; parameter containing a manipulated &lsquo;options&rsquo; array.</li>
<li>Within the &lsquo;options&rsquo; array, the attacker injects SQL code into one or more of the parameter keys.</li>
<li>The WordPress server processes the request without properly sanitizing the injected SQL code.</li>
<li>The application constructs a SQL query using the unsanitized input, effectively injecting the malicious code into the query.</li>
<li>The database server executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, by using the SQL injection vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-3599) allows unauthenticated attackers to extract sensitive information from the WordPress database. This may include user credentials (usernames, email addresses, and password hashes), customer data, financial information, and other confidential data stored within the database. The impact can range from defacement of the website and data theft, to complete compromise of the WordPress site and its associated server. Due to the widespread use of WordPress and its plugins, this vulnerability poses a significant threat to a potentially large number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Riaxe Product Customizer plugin to a version higher than 2.1.2 to patch CVE-2026-3599.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts via Riaxe Product Customizer Plugin</code> to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>sqli</category><category>plugin</category></item><item><title>Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</link><pubDate>Thu, 16 Apr 2026 06:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin for WordPress, versions 2.1.2 and earlier, contains a critical privilege escalation vulnerability (CVE-2026-3596). This flaw stems from an unauthenticated AJAX action, &lsquo;wp_ajax_nopriv_install-imprint&rsquo;, which is improperly secured. The corresponding function, <code>ink_pd_add_option()</code>, allows unauthenticated users to modify arbitrary WordPress options by sending POST requests. There are no nonce checks, capability checks, or input validation performed on the &lsquo;option&rsquo; and &lsquo;opt_value&rsquo; parameters, making it trivial to manipulate sensitive site settings. Successful exploitation allows attackers to grant themselves administrative privileges. This vulnerability poses a significant risk to any WordPress site using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the Riaxe Product Customizer plugin (&lt;= 2.1.2).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes the <code>action</code> parameter set to <code>install-imprint</code>, triggering the vulnerable AJAX action <code>wp_ajax_nopriv_install-imprint</code>.</li>
<li>The attacker sets the <code>option</code> parameter to <code>default_role</code> and the <code>opt_value</code> parameter to <code>administrator</code> within the POST request. This will change the default user role to administrator.</li>
<li>The attacker sets the <code>option</code> parameter to <code>users_can_register</code> and the <code>opt_value</code> parameter to <code>1</code> within the POST request. This enables user registration on the WordPress site.</li>
<li>The <code>ink_pd_add_option()</code> function executes, calling <code>delete_option()</code> and <code>add_option()</code> with the attacker-supplied values, effectively updating the WordPress options table.</li>
<li>The attacker registers a new user account on the WordPress site.</li>
<li>Because user registration is enabled and the default user role is set to administrator, the attacker&rsquo;s new account is granted administrator privileges, allowing full control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3596 allows unauthenticated attackers to gain complete control over a vulnerable WordPress website. This can lead to website defacement, data theft, malware distribution, and denial of service. Given the widespread use of WordPress, this vulnerability has the potential to affect a large number of websites across various sectors. A successful attack would result in the attacker having the same access as the original website administrator.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove the Riaxe Product Customizer plugin from WordPress installations if it is present. This will eliminate the attack vector (plugin removal).</li>
<li>Monitor web server logs (category: <code>webserver</code>, product: <code>linux</code> or <code>windows</code>) for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>install-imprint</code> using the Sigma rule provided below.</li>
<li>Consider implementing a Web Application Firewall (WAF) rule to block requests matching the exploit pattern described in the Attack Chain.</li>
<li>Review WordPress user accounts for any unauthorized administrators.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>cve-2026-3596</category><category>plugin</category></item><item><title>LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)</title><link>https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</link><pubDate>Tue, 14 Apr 2026 02:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</guid><description>The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.</description><content:encoded><![CDATA[<p>The LearnPress plugin for WordPress, in versions up to and including 4.3.2.8, is susceptible to unauthorized data deletion. The vulnerability stems from a missing capability check on the <code>delete_question_answer()</code> function. The plugin exposes a <code>wp_rest</code> nonce in public frontend HTML, and this nonce serves as the sole security check for the <code>lp-load-ajax</code> AJAX dispatcher. As the <code>delete_question_answer</code> action lacks capability or ownership validation, unauthenticated attackers can exploit this flaw to delete arbitrary quiz answer options. This is achieved by sending a crafted POST request containing a publicly available nonce. Exploitation does not require any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a LearnPress installation with a vulnerable version (&lt;= 4.3.2.8).</li>
<li>The attacker accesses the public frontend of the WordPress site.</li>
<li>The attacker retrieves the <code>wp_rest</code> nonce from the <code>lpData</code> variable in the HTML source code. This nonce is used for AJAX requests.</li>
<li>The attacker crafts a POST request to the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>action</code> parameter set to <code>delete_question_answer</code>.</li>
<li>The request also includes the <code>nonce</code> parameter with the value of the retrieved <code>wp_rest</code> nonce.</li>
<li>The request includes the <code>answer_id</code> parameter set to the ID of the quiz answer option to be deleted.</li>
<li>The server, lacking proper capability checks, processes the request and deletes the specified quiz answer option from the database. This results in data loss and potentially disrupts the functionality of quizzes within the LearnPress plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to arbitrarily delete quiz answer options within the LearnPress plugin. This can lead to data loss, disruption of quizzes, and potentially compromise the integrity of educational content. The CVSS v3.1 base score for this vulnerability is 9.1, indicating a critical severity. The number of victims and specific sectors targeted are currently unknown, but any website using the vulnerable LearnPress plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LearnPress plugin to a version greater than 4.3.2.8 to patch CVE-2026-4365.</li>
<li>Deploy the Sigma rule &ldquo;Detect LearnPress Unauthorized Data Deletion Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>delete_question_answer</code> and investigate suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>learnpress</category><category>data-deletion</category><category>unauthorized-access</category></item><item><title>Helm Plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</guid><description>A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.</description><content:encoded><![CDATA[<p>Helm, a package manager for Kubernetes charts, is vulnerable to a path traversal issue. Specifically, Helm versions 4.0.0 through 4.1.3 are affected. A maliciously crafted Helm plugin, when installed or updated, can exploit this vulnerability (CVE-2026-35204) to write the plugin&rsquo;s contents to arbitrary locations on the user&rsquo;s filesystem. This can lead to overwriting critical system files or user data, potentially compromising the system&rsquo;s integrity. Helm v4.1.4 resolves this vulnerability by rejecting plugins with non-SemVer versions containing path traversal patterns. Defenders should ensure Helm installations are updated to the patched version or implement workarounds to validate plugin metadata.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Helm plugin. This plugin contains a <code>plugin.yaml</code> file with a <code>version</code> field that includes POSIX dot-dot path separators (e.g., <code>/../</code>).</li>
<li>The attacker distributes the malicious plugin to potential victims, possibly through public repositories or direct spear phishing.</li>
<li>A victim attempts to install or update the Helm plugin using the <code>helm plugin install</code> or <code>helm plugin update</code> command.</li>
<li>Helm parses the <code>plugin.yaml</code> file and extracts the <code>version</code> field, which contains the path traversal characters.</li>
<li>Due to the vulnerability, Helm incorrectly resolves the file path, allowing the plugin&rsquo;s contents to be written outside the intended plugin directory.</li>
<li>The malicious plugin overwrites arbitrary files on the user&rsquo;s system based on the path specified in the <code>version</code> field.</li>
<li>Depending on the files overwritten, the attacker can achieve various malicious objectives, such as gaining persistence, escalating privileges, or executing arbitrary code.</li>
<li>The attacker achieves persistence by overwriting system startup scripts or configuration files, allowing the malicious code to run automatically on system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to overwrite arbitrary files on the victim&rsquo;s system. This can lead to various detrimental outcomes, including data loss, system instability, privilege escalation, and ultimately, complete system compromise. While the specific number of victims is unknown, any user running a vulnerable version of Helm (4.0.0 - 4.1.3) is at risk. The potential impact includes compromising Kubernetes deployments and sensitive data stored on affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Helm to version 4.1.4 or later to remediate CVE-2026-35204, as this version includes a patch that prevents path traversal during plugin installation.</li>
<li>Implement a validation step before installing or updating Helm plugins, checking the <code>plugin.yaml</code> file for a <code>version:</code> field containing POSIX dot-dot path separators. This mitigates the risk described in the workaround section of the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Helm Plugin Install with Path Traversal&rdquo; to detect attempts to install plugins with malicious <code>version</code> fields, using file_event logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>helm</category><category>path-traversal</category><category>vulnerability</category><category>plugin</category><category>kubernetes</category></item><item><title>wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</link><pubDate>Sat, 11 Apr 2026 08:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</guid><description>The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.</description><content:encoded><![CDATA[<p>The wpForo Forum plugin, a popular WordPress plugin, is susceptible to an arbitrary file deletion vulnerability (CVE-2026-5809) affecting versions up to and including 3.0.2. The vulnerability stems from insufficient validation of user-supplied data within the <code>topic_add()</code> and <code>topic_edit()</code> action handlers. Specifically, the plugin improperly handles array values in the <code>$_REQUEST</code> data, storing them as postmeta without proper filtering. An authenticated attacker (subscriber-level or higher) can exploit this by injecting a malicious file path into the <code>data[body][fileurl]</code> parameter. This injected path is subsequently used in a file deletion function without adequate sanitization, leading to potential deletion of critical system files. This vulnerability allows attackers to potentially cripple the WordPress installation or gain further access to the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with at least subscriber-level privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>topic_add()</code> or <code>topic_edit()</code> action handler.</li>
<li>Within the request, the attacker includes the <code>data[body][fileurl]</code> parameter containing the path to the file they wish to delete (e.g., <code>/var/www/html/wp-config.php</code>).</li>
<li>The wpForo plugin stores the attacker-supplied <code>fileurl</code> value as postmeta associated with the forum topic without proper validation.</li>
<li>The attacker crafts another request, this time including the <code>wpftcf_delete[]=body</code> parameter, targeting the <code>topic_edit</code> action.</li>
<li>The <code>add_file()</code> method retrieves the poisoned <code>fileurl</code> from the stored postmeta record.</li>
<li>The plugin attempts to sanitize the path using <code>wpforo_fix_upload_dir()</code>, but this function only modifies paths within the legitimate wpForo upload directory, leaving other paths untouched.</li>
<li>The plugin calls <code>wp_delete_file()</code> on the unsanitized path, resulting in the deletion of the targeted file if the PHP process has write permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to delete arbitrary files on the server, provided the PHP process has the necessary write permissions. This can lead to a denial of service by deleting core WordPress files or configuration files such as <code>wp-config.php</code>. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high severity. This could lead to complete compromise of the WordPress installation and potential further exploitation of the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the wpForo Forum plugin to a version higher than 3.0.2 to patch CVE-2026-5809.</li>
<li>Deploy the Sigma rule &ldquo;Detect wpForo Arbitrary File Deletion Attempt&rdquo; to your SIEM to detect potential exploitation attempts by monitoring HTTP requests to WordPress.</li>
<li>Implement stricter file permission controls to limit the PHP process&rsquo;s write access to only necessary directories and files.</li>
<li>Monitor web server logs for suspicious POST requests containing the <code>wpftcf_delete</code> parameter, as highlighted in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>plugin</category><category>CVE-2026-5809</category></item><item><title>Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 10:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</guid><description>The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.</description><content:encoded><![CDATA[<p>The Gravity SMTP plugin, a WordPress extension facilitating email sending through SMTP, contains a missing authorization vulnerability (CVE-2026-4162) affecting versions 2.1.4 and earlier. This flaw allows authenticated users with minimal subscriber-level permissions to perform administrative actions such as uninstalling and deactivating the plugin, as well as deleting its associated options. The vulnerability stems from the plugin failing to properly validate user authorization before executing sensitive functions. Additionally, the vulnerability can be exploited via a Cross-Site Request Forgery (CSRF) attack. Patches have been released in Gravity SMTP version 2.1.5 to address this security concern. Exploitation of this vulnerability allows low-privileged users to disrupt email functionality and potentially compromise WordPress configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with subscriber-level or higher privileges.</li>
<li>The attacker crafts a malicious HTTP request to uninstall the Gravity SMTP plugin, leveraging the missing authorization vulnerability. This request targets the WordPress plugin management endpoint.</li>
<li>Alternatively, the attacker crafts a CSRF attack that tricks a privileged user into triggering the malicious HTTP request to uninstall the plugin.</li>
<li>The WordPress server receives the crafted request without proper authorization checks.</li>
<li>The plugin&rsquo;s uninstall function is executed, removing the Gravity SMTP plugin from the WordPress installation.</li>
<li>The attacker crafts another HTTP request to delete Gravity SMTP plugin options.</li>
<li>The WordPress server processes the request, and the plugin options are deleted from the database.</li>
<li>The Gravity SMTP plugin is uninstalled and deactivated, and its settings are removed, disrupting the email functionality of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4162 allows attackers with low-level privileges on a WordPress site to disable email functionality and manipulate plugin settings. While the number of affected installations remains unknown, the impact can be significant for organizations heavily reliant on WordPress for communication or critical business processes, potentially leading to disruption of services, loss of email functionality, and unauthorized access to sensitive data or configurations. The CVSS v3.1 score of 7.1 indicates a high severity, considering the ease of exploitation and the potential for widespread disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity SMTP plugin to version 2.1.5 or later to patch CVE-2026-4162.</li>
<li>Monitor WordPress access logs for unauthorized requests targeting the plugin management endpoints to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect WordPress Plugin Uninstall via Missing Auth</code> to identify suspicious activity.</li>
<li>Implement CSRF protection mechanisms within WordPress plugins to mitigate the risk of CSRF-based exploitation.</li>
<li>Review WordPress user roles and permissions to minimize the attack surface and restrict access to sensitive functionalities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>missing-authorization</category><category>plugin</category><category>cve-2026-4162</category></item><item><title>Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</link><pubDate>Thu, 09 Apr 2026 23:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</guid><description>Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.</description><content:encoded><![CDATA[<p>Smart Slider 3 Pro version 3.5.1.35, a popular WordPress and Joomla plugin, is vulnerable to remote code execution due to a compromised update system. This vulnerability, tracked as CVE-2026-34424, allows unauthenticated attackers to inject a multi-stage remote access toolkit. The attackers leverage this toolkit to execute arbitrary code and commands, effectively taking control of the affected web server. This vulnerability poses a significant threat to websites using the vulnerable plugin, potentially leading to data theft, website defacement, or use of the server for malicious purposes. Defenders should prioritize patching or removing the affected plugin version immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the Smart Slider 3 Pro update server.</li>
<li>A malicious update is pushed to vulnerable Smart Slider 3 Pro installations (version 3.5.1.35).</li>
<li>The plugin downloads and installs the malicious update, injecting the multi-stage remote access toolkit.</li>
<li>The attacker triggers pre-authentication remote shell execution by sending crafted HTTP headers to the web server.</li>
<li>An authenticated backdoor is established, allowing the attacker to execute arbitrary PHP code or OS commands.</li>
<li>The attacker creates hidden administrator accounts within WordPress or Joomla to maintain persistent access.</li>
<li>Credentials and access keys are exfiltrated from the compromised system.</li>
<li>Persistence is maintained through multiple injection points, including modifications to must-use plugins and core files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34424 leads to complete compromise of the affected web server. Attackers can gain unauthorized access to sensitive data, including user credentials, database information, and proprietary code. Websites can be defaced, injected with malware, or used as part of a botnet. The vulnerability affects all users of Smart Slider 3 Pro version 3.5.1.35, regardless of the underlying operating system. Given the widespread use of WordPress and Joomla, a large number of websites are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove or update Smart Slider 3 Pro to a patched version newer than 3.5.1.35 to remediate CVE-2026-34424.</li>
<li>Monitor web server logs for suspicious HTTP requests with unusual headers indicative of attempted pre-authentication shell execution as described in the Attack Chain.</li>
<li>Implement the provided Sigma rules to detect suspicious process creation and file modifications related to the injected toolkit.</li>
<li>Audit user accounts for unauthorized administrator accounts as the attacker creates hidden accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>joomla</category><category>remote-code-execution</category><category>plugin</category></item><item><title>WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)</title><link>https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</link><pubDate>Wed, 08 Apr 2026 12:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</guid><description>The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.</description><content:encoded><![CDATA[<p>The WooCommerce Ajax Product Filter (WCAPF) plugin, a WordPress extension, is susceptible to a time-based SQL Injection vulnerability (CVE-2026-3396). This flaw stems from inadequate input sanitization of the <code>post-author</code> parameter and insufficient preparation within the existing SQL query structure. Specifically, all versions of the plugin up to and including version 4.2.3 are affected. An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code into the <code>post-author</code> parameter. Successful exploitation allows the attacker to manipulate database queries and extract sensitive information without requiring authentication. This vulnerability poses a significant risk to e-commerce sites using the WCAPF plugin, as attackers could potentially access customer data, administrative credentials, or other confidential information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WooCommerce website using a vulnerable version (&lt;=4.2.3) of the WCAPF plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the vulnerable <code>post-author</code> parameter.</li>
<li>The crafted request includes SQL injection payload within the <code>post-author</code> parameter, designed to extract data using time-based techniques. For example, the attacker might use a <code>SLEEP()</code> function to introduce delays based on conditional database queries.</li>
<li>The web server processes the request and passes the unsanitized <code>post-author</code> parameter to the database query.</li>
<li>The injected SQL code manipulates the original query, causing the database to execute the attacker&rsquo;s malicious commands.</li>
<li>Based on the response time (due to the <code>SLEEP()</code> function), the attacker infers whether their injected SQL query was successful in retrieving specific data.</li>
<li>The attacker iteratively refines their SQL injection payload to extract sensitive information, such as user credentials or customer details.</li>
<li>The attacker exfiltrates the obtained data, potentially using it for identity theft, financial fraud, or further attacks against the compromised website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3396 can lead to the complete compromise of the vulnerable WooCommerce website&rsquo;s database. An attacker could potentially access sensitive customer data, including names, addresses, credit card details, and purchase history. Furthermore, administrative credentials could be stolen, allowing the attacker to gain full control over the website. This can result in significant financial losses, reputational damage, and legal liabilities for the affected e-commerce business. While the exact number of affected websites is unknown, any online store using the WCAPF plugin versions 4.2.3 or earlier is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WCAPF plugin to a version greater than 4.2.3 to patch CVE-2026-3396 (references: CVE-2026-3396).</li>
<li>Deploy the Sigma rule <code>Detect WooCommerce SQL Injection Attempt</code> to identify potential exploitation attempts in web server logs (references: Sigma rule).</li>
<li>Implement input validation and sanitization on the <code>post-author</code> parameter to prevent SQL injection attacks (references: Attack Chain).</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads, particularly those targeting WCAPF plugin endpoints (references: Sigma rule, Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>woocommerce</category><category>sqli</category><category>cve-2026-3396</category><category>wordpress</category><category>plugin</category></item><item><title>WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</link><pubDate>Wed, 08 Apr 2026 07:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</guid><description>The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Gerador de Certificados – DevApps plugin for WordPress, versions up to and including 1.3.6, contains an arbitrary file upload vulnerability (CVE-2026-4808). This flaw stems from a lack of file type validation within the <code>moveUploadedFile()</code> function. Authenticated users with administrator privileges or higher can exploit this vulnerability by uploading arbitrary files to the affected server. Successful exploitation could allow an attacker to execute arbitrary code on the server, leading to a complete system compromise. This vulnerability poses a significant threat to websites using the affected plugin, potentially impacting data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with administrator-level privileges.</li>
<li>The attacker navigates to the Gerador de Certificados – DevApps plugin&rsquo;s upload functionality.</li>
<li>The attacker crafts a malicious file (e.g., a PHP file) with a disguised extension or no extension.</li>
<li>The attacker uploads the malicious file through the plugin&rsquo;s interface, bypassing the missing file type validation in the <code>moveUploadedFile()</code> function.</li>
<li>The plugin saves the file to a publicly accessible directory on the server.</li>
<li>The attacker identifies the location of the uploaded file.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location.</li>
<li>The server executes the malicious code within the uploaded file, granting the attacker remote code execution capabilities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers with administrator privileges to upload arbitrary files to the web server. This can lead to remote code execution, potentially allowing the attacker to gain full control of the WordPress website and the underlying server. This could lead to data theft, website defacement, or use of the server for malicious purposes such as hosting phishing sites or launching attacks against other systems. The number of affected sites is potentially very large.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gerador de Certificados – DevApps plugin to the latest version, which includes a fix for CVE-2026-4808.</li>
<li>Implement web server configurations to prevent the execution of scripts in upload directories.</li>
<li>Enable web server logging and monitor for suspicious file uploads and access attempts to unusual file types.</li>
<li>Deploy the Sigma rule to detect attempts to access PHP files within the wp-content/uploads directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>remote-code-execution</category></item><item><title>WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</guid><description>The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.</description><content:encoded><![CDATA[<p>The Widgets for Social Photo Feed plugin for WordPress, versions up to and including 1.7.9, contains a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5425). This vulnerability stems from insufficient input sanitization and output escaping of the &lsquo;feed_data&rsquo; parameter keys. An unauthenticated attacker can exploit this flaw by injecting malicious JavaScript code into the WordPress database. When a user visits a page containing a vulnerable widget, the injected script executes within their browser, potentially leading to session hijacking, account takeover, or other malicious activities. This vulnerability was reported by Wordfence and patched in version 1.8 of the plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;= 1.7.9) of the Widgets for Social Photo Feed plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting the plugin&rsquo;s functionality that handles the <code>feed_data</code> parameter. This request contains XSS payload within the parameter keys.</li>
<li>The WordPress server receives the crafted HTTP request. The vulnerable plugin processes the request without proper input sanitization or output escaping.</li>
<li>The malicious XSS payload is stored in the WordPress database, associated with the plugin&rsquo;s settings or data.</li>
<li>A legitimate user visits a page on the WordPress site where the affected widget is displayed.</li>
<li>The WordPress server retrieves the plugin data, including the stored XSS payload, from the database.</li>
<li>The server renders the page with the unsanitized XSS payload embedded within the HTML output.</li>
<li>The user&rsquo;s browser receives the HTML page containing the malicious script and executes it. This could lead to redirection, information theft, or further compromise of the user&rsquo;s session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a website user&rsquo;s browser. This can result in session hijacking, defacement of the website, redirection to malicious sites, or the theft of sensitive information. While the exact number of vulnerable installations is not available, the widespread use of WordPress plugins makes this a potentially significant threat, particularly for sites that do not promptly apply security updates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Widgets for Social Photo Feed plugin to version 1.8 or later to patch CVE-2026-5425.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Social Photo Feed XSS Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement a web application firewall (WAF) rule to filter out requests containing potentially malicious JavaScript code in the <code>feed_data</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-5425</category><category>plugin</category></item><item><title>ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</guid><description>The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.</description><content:encoded><![CDATA[<p>The ProfilePress plugin for WordPress, specifically the &ldquo;Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile &amp; Restrict Content&rdquo; version 4.16.11 and earlier, contains a vulnerability (CVE-2026-3445) that allows authenticated attackers to bypass membership payment requirements. This flaw stems from a missing ownership verification on the <code>change_plan_sub_id</code> parameter within the <code>process_checkout()</code> function. An attacker with subscriber-level access can exploit this by referencing another user&rsquo;s active subscription during the checkout process. This manipulation affects proration calculations, ultimately enabling the attacker to obtain paid lifetime membership plans without submitting legitimate payment. This vulnerability is triggered via the <code>ppress_process_checkout</code> AJAX action, making it critical for defenders to implement appropriate detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers a new account on the WordPress site with the vulnerable ProfilePress plugin installed, obtaining subscriber-level access.</li>
<li>The attacker identifies a valid, active subscription ID belonging to another user within the ProfilePress system.</li>
<li>The attacker initiates the purchase of a paid membership plan (e.g., a lifetime membership).</li>
<li>During the checkout process, the attacker intercepts the HTTP request sent to the <code>ppress_process_checkout</code> AJAX action.</li>
<li>The attacker modifies the <code>change_plan_sub_id</code> parameter within the request, replacing the expected value with the subscription ID of the other user.</li>
<li>The server-side <code>process_checkout()</code> function fails to properly validate the ownership of the provided <code>change_plan_sub_id</code>.</li>
<li>Due to the manipulated <code>change_plan_sub_id</code>, the proration calculations are skewed, resulting in a significantly reduced or zeroed payment amount.</li>
<li>The attacker completes the checkout process without making a legitimate payment and is granted access to the paid membership plan.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3445 allows attackers to bypass payment requirements and gain unauthorized access to premium content and features offered through the ProfilePress plugin. This can result in significant revenue loss for website owners relying on paid memberships. The number of affected websites is potentially large, given the popularity of WordPress and the ProfilePress plugin. This vulnerability could also damage the reputation of the affected website and erode trust among legitimate paying members.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ProfilePress version 4.16.12 or later to patch CVE-2026-3445 (reference: vulnerability description).</li>
<li>Deploy the Sigma rule <code>Detect ProfilePress Membership Bypass Attempt</code> to your SIEM and tune for your environment to detect potential exploitation attempts by monitoring for the use of the <code>ppress_process_checkout</code> AJAX action with suspicious <code>change_plan_sub_id</code> values (reference: Sigma rule).</li>
<li>Monitor web server logs for POST requests to the <code>/wp-admin/admin-ajax.php</code> endpoint with the <code>action</code> parameter set to <code>ppress_process_checkout</code> to identify potential exploit attempts (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>vulnerability</category><category>membership</category></item><item><title>Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-11-wordpress-blackhole-xss/</link><pubDate>Thu, 26 Mar 2026 05:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-11-wordpress-blackhole-xss/</guid><description>The Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.</description><content:encoded><![CDATA[<p>The Blackhole for Bad Bots plugin for WordPress, up to and including version 3.8, contains a stored cross-site scripting (XSS) vulnerability. The vulnerability stems from insufficient input sanitization and output escaping of the User-Agent HTTP header when capturing bot data. Specifically, the plugin uses <code>sanitize_text_field()</code> which strips HTML tags but does not escape HTML entities. This data is then stored using <code>update_option()</code> and later displayed on the Bad Bots log page. The stored data is output into HTML input value attributes and HTML span content without proper escaping via <code>esc_attr()</code> or <code>esc_html()</code>. This allows an unauthenticated attacker to inject arbitrary web scripts that are executed when an administrator views the Blackhole Bad Bots admin page, potentially leading to privilege escalation or other malicious actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a request to the WordPress site with a malicious User-Agent header containing XSS payload.</li>
<li>The Blackhole for Bad Bots plugin captures the User-Agent string using <code>sanitize_text_field()</code>, which inadequately sanitizes the input.</li>
<li>The plugin stores the inadequately sanitized User-Agent string in the WordPress options database using <code>update_option()</code>.</li>
<li>A WordPress administrator navigates to the Blackhole Bad Bots admin page.</li>
<li>The plugin retrieves the stored User-Agent strings from the database.</li>
<li>The plugin outputs the stored User-Agent string directly into HTML input value attributes (lines 75-83) without <code>esc_attr()</code> and into HTML span content without <code>esc_html()</code> on the admin page.</li>
<li>The administrator&rsquo;s browser executes the injected XSS payload.</li>
<li>The XSS payload can perform actions such as stealing the administrator&rsquo;s session cookie, redirecting the administrator to a malicious site, or performing actions on behalf of the administrator.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to inject arbitrary web scripts that execute in the context of an administrator&rsquo;s browser session. This can lead to various malicious outcomes, including account takeover, data theft, and defacement of the WordPress site. Given the widespread use of WordPress and the Blackhole for Bad Bots plugin, a successful exploit could impact a significant number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Blackhole for Bad Bots plugin to a version greater than 3.8 to remediate CVE-2026-4329.</li>
<li>Implement a Web Application Firewall (WAF) rule to filter requests containing suspicious User-Agent headers that might exploit CVE-2026-4329.</li>
<li>Monitor web server logs for requests with unusual or potentially malicious User-Agent strings to detect potential exploitation attempts related to CVE-2026-4329.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>plugin</category><category>cve-2026-4329</category></item><item><title>WP Job Portal Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</guid><description>The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.</description><content:encoded><![CDATA[<p>The WP Job Portal plugin for WordPress, a widely used plugin for managing job listings, is susceptible to SQL Injection attacks. This vulnerability, identified as CVE-2026-4306, affects all versions up to and including 2.4.8. The flaw stems from the insufficient sanitization of the &lsquo;radius&rsquo; parameter, which is directly incorporated into SQL queries without proper escaping. This lack of input validation enables unauthenticated attackers to inject malicious SQL code into the application&rsquo;s database queries. Successful exploitation could lead to the unauthorized disclosure of sensitive information stored within the WordPress database. Given the popularity of WordPress and the WP Job Portal plugin, a successful attack could impact a large number of websites and expose confidential data, including user credentials, financial details, and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP request targeting the WordPress website running the vulnerable WP Job Portal plugin.</li>
<li>The attacker appends a SQL injection payload to the &lsquo;radius&rsquo; parameter within the HTTP request.</li>
<li>The vulnerable plugin receives the request and incorporates the unsanitized &lsquo;radius&rsquo; parameter into an SQL query within <code>includes/ajax.php</code> or <code>modules/job/model.php</code>.</li>
<li>The injected SQL code is executed against the WordPress database due to the lack of proper input validation and escaping.</li>
<li>The attacker leverages the SQL injection to extract sensitive information from the database, such as user credentials, API keys, or other confidential data.</li>
<li>The extracted data may be exfiltrated from the server using various techniques.</li>
<li>The attacker could potentially use the compromised data to gain further access to the WordPress site or connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-4306) could lead to the complete compromise of the WordPress database. Attackers could gain access to sensitive information, including user credentials, customer data, and confidential business information. The vulnerability impacts all users running WP Job Portal plugin versions 2.4.8 and earlier. The CVSS v3.1 score is 7.5, indicating a high severity risk. The impact includes unauthorized data access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Job Portal plugin to version 2.4.9 or later to patch the SQL Injection vulnerability (CVE-2026-4306).</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL Injection attempts targeting the &lsquo;radius&rsquo; parameter in WordPress plugins.</li>
<li>Enable detailed logging for your web server (category &ldquo;webserver&rdquo;, product &ldquo;linux|windows&rdquo;) to monitor for suspicious activity and potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)</title><link>https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</link><pubDate>Mon, 24 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</guid><description>CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.</description><content:encoded><![CDATA[<p>The Otter Blocks plugin, a popular WordPress extension, is susceptible to a purchase verification bypass vulnerability identified as CVE-2026-2892. This flaw affects all versions up to and including 3.1.4. The vulnerability stems from the plugin&rsquo;s reliance on an unsigned cookie, &lsquo;o_stripe_data&rsquo;, to determine Stripe product ownership for unauthenticated users. The &lsquo;get_customer_data&rsquo; method uses this cookie, and the subsequent &lsquo;check_purchase&rsquo; method trusts its contents without proper server-side validation against the Stripe API. This lack of verification enables attackers to gain unauthorized access to purchase-gated content. The target product ID is often exposed in the checkout block&rsquo;s HTML source, further simplifying the exploit. Successful exploitation allows attackers to bypass payment requirements, potentially impacting content creators and businesses relying on the plugin for revenue generation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Otter Blocks plugin (version &lt;= 3.1.4).</li>
<li>The attacker examines the HTML source code of a checkout block on the target site to identify the target product ID.</li>
<li>The attacker crafts a malicious &lsquo;o_stripe_data&rsquo; cookie containing the target product ID.</li>
<li>The attacker sets the forged &lsquo;o_stripe_data&rsquo; cookie in their browser.</li>
<li>The attacker navigates to the purchase-gated content on the WordPress site.</li>
<li>The &lsquo;get_customer_data&rsquo; method reads the forged &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>The &lsquo;check_purchase&rsquo; method incorrectly validates the forged purchase data without server-side verification against the Stripe API.</li>
<li>The attacker gains unauthorized access to the purchase-gated content, bypassing the intended payment requirement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2892 allows unauthenticated attackers to bypass purchase verification mechanisms implemented by the Otter Blocks plugin. This can lead to unauthorized access to premium content, resulting in revenue loss for content creators and businesses using the plugin. The number of potentially affected websites is significant, given the popularity of WordPress and the Otter Blocks plugin. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Otter Blocks plugin to a version greater than 3.1.4 to patch CVE-2026-2892.</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts targeting the vulnerable plugin.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious cookie manipulation activity, specifically targeting the &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>Implement server-side validation of purchase data against the Stripe API to prevent cookie forgery attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>purchase-bypass</category><category>CVE-2026-2892</category><category>defense-evasion</category></item><item><title>Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</link><pubDate>Thu, 29 Feb 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</guid><description>The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Breeze Cache plugin for WordPress, in versions up to and including 2.4.4, contains an arbitrary file upload vulnerability (CVE-2026-3844). This flaw stems from the lack of file type validation within the &lsquo;fetch_gravatar_from_remote&rsquo; function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress site&rsquo;s server. Successful exploitation could lead to remote code execution on the server. It is important to note that the vulnerability can only be exploited if the &ldquo;Host Files Locally - Gravatars&rdquo; setting is enabled within the Breeze Cache plugin. This setting is disabled by default, reducing the attack surface. Defenders should prioritize identifying potentially compromised systems running vulnerable versions of Breeze Cache with the &ldquo;Host Files Locally - Gravatars&rdquo; option enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 2.4.4) of the Breeze Cache plugin.</li>
<li>The attacker confirms the &ldquo;Host Files Locally - Gravatars&rdquo; option is enabled on the target WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;fetch_gravatar_from_remote&rsquo; function. This request contains a payload designed to upload an arbitrary file to the server.</li>
<li>Due to the missing file type validation, the server accepts the malicious file upload without proper sanitization. The uploaded file can be a PHP file, a web shell, or another executable type.</li>
<li>The attacker determines the location where the file has been saved by the plugin.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location, triggering its execution on the server.</li>
<li>The malicious file executes, granting the attacker remote code execution capabilities on the web server.</li>
<li>The attacker can then perform actions such as installing malware, stealing sensitive data, or further compromising the server and network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to upload arbitrary files to a vulnerable WordPress server. This can lead to complete compromise of the server, allowing for remote code execution. The attacker can then pivot to other systems, steal sensitive information, or cause significant disruption. While the &ldquo;Host Files Locally - Gravatars&rdquo; option is disabled by default, any instance where this option is enabled is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Breeze Cache plugin to the latest version to patch CVE-2026-3844.</li>
<li>Disable the &ldquo;Host Files Locally - Gravatars&rdquo; setting in the Breeze Cache plugin if it is enabled.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious file uploads and requests to unusual file extensions using the provided Sigma rules.</li>
<li>Implement strict file upload policies and validation mechanisms on all web applications to prevent arbitrary file uploads.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>rce</category></item><item><title>Royal Elementor Addons Plugin SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin, a popular WordPress extension, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-6229) in versions up to and including 1.7.1057. This flaw stems from inadequate validation of user-provided URLs within the <code>render_csv_data()</code> function. Attackers can bypass the validation by including &lsquo;docs.google.com/spreadsheets&rsquo; in a query parameter. The vulnerability is triggered because the plugin uses these URLs in <code>fopen()</code> calls without implementing adequate safeguards to prevent access to internal or private network addresses. This vulnerability enables authenticated attackers with Contributor-level access or higher to craft malicious requests, potentially exposing sensitive internal data. Successful exploitation allows attackers to probe internal network resources, access configuration files, and potentially escalate attacks further.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Contributor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>render_csv_data()</code> function within the Royal Elementor Addons plugin.</li>
<li>The malicious request includes a user-supplied URL containing &lsquo;docs.google.com/spreadsheets&rsquo; within a query parameter to bypass initial validation checks.</li>
<li>The plugin&rsquo;s <code>render_csv_data()</code> function receives the crafted URL without proper sanitization or validation against internal or private network addresses.</li>
<li>The <code>fopen()</code> function is called with the attacker-controlled URL, initiating an outbound request from the WordPress server.</li>
<li>If the URL points to an internal resource, the WordPress server retrieves the resource content.</li>
<li>The attacker receives the content of the internal resource in the response from the WordPress server.</li>
<li>The attacker analyzes the retrieved content for sensitive information, such as configuration files, API keys, or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-6229) can lead to the exposure of sensitive internal information, potentially impacting all organizations using the Royal Elementor Addons plugin for WordPress version 1.7.1057 and below. This may include internal configuration files, API keys, database credentials, or other sensitive data accessible through internal services. The severity is high due to the potential for attackers to pivot from this vulnerability and further compromise the WordPress server or the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to a version higher than 1.7.1057 to patch CVE-2026-6229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Royal Elementor Addons SSRF Attempt via URL Parameter&rdquo; to identify malicious requests targeting the <code>render_csv_data()</code> function in your web server logs.</li>
<li>Implement strict network segmentation and firewall rules to limit access from the WordPress server to internal resources, mitigating the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>ssrf</category><category>cve-2026-6229</category><category>plugin</category></item><item><title>WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</guid><description>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.</description><content:encoded><![CDATA[<p>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress, in versions up to and including 1.1.3, contains an arbitrary file upload vulnerability tracked as CVE-2026-5364. The flaw stems from insufficient sanitization of file extensions during the upload process. Specifically, the plugin extracts the file extension before sanitization and allows the file type parameter to be controlled by the attacker. Furthermore, validation occurs on the unsanitized extension, while the file is saved with a sanitized extension, stripping special characters like &lsquo;$&rsquo; during the save. While an .htaccess file and name randomization are present, these restrictions may be bypassable in certain configurations or by exploiting other vulnerabilities. This vulnerability could allow unauthenticated attackers to upload arbitrary PHP files to the web server, potentially leading to remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.1.3) of the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the plugin&rsquo;s upload endpoint, typically <code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>.</li>
<li>The POST request includes a file with a manipulated extension, such as <code>evil.php$.jpg</code>, where <code>evil.php</code> is the malicious PHP payload and <code>$.jpg</code> is designed to be sanitized to <code>.jpg</code>.</li>
<li>The attacker modifies the <code>file type</code> parameter in the request to reflect the original manipulated file extension (<code>evil.php$.jpg</code>).</li>
<li>The plugin validates the extension against administrator-configured types but, due to the unsanitized extension and attacker control over the file type parameter, the malicious file passes validation.</li>
<li>The plugin sanitizes the extension, removing the <code>$</code> character, resulting in a file saved with the extension <code>.php</code>.</li>
<li>The attacker attempts to access the uploaded PHP file via a direct HTTP request to <code>/wp-content/uploads/&lt;random_name&gt;.php</code>.</li>
<li>If the <code>.htaccess</code> restrictions are bypassed (e.g., due to misconfiguration or another vulnerability), the web server executes the malicious PHP code, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5364 allows unauthenticated attackers to upload and execute arbitrary PHP code on the target WordPress server. This can lead to complete compromise of the website, including defacement, data theft, and installation of backdoors. While the presence of <code>.htaccess</code> and name randomization mitigates the risk, these protections may be bypassed, especially when combined with other vulnerabilities or misconfigurations. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to a large number of websites. The CVSS v3.1 base score is 8.1, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin to the latest version (greater than 1.1.3) to patch CVE-2026-5364.</li>
<li>Implement a Web Application Firewall (WAF) rule to inspect and block requests containing suspicious file extensions in the POST parameters targeting the plugin&rsquo;s upload endpoint (<code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious File Upload via Drag and Drop CF7</code> to identify exploitation attempts in web server logs (cs-uri-query).</li>
<li>Review and harden <code>.htaccess</code> configurations to ensure that PHP execution is restricted in the <code>/wp-content/uploads/</code> directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>plugin</category><category>CVE-2026-5364</category></item><item><title>WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</guid><description>An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The Profile Builder Pro plugin for WordPress is susceptible to a critical PHP Object Injection vulnerability (CVE-2026-7647) affecting all versions up to and including 3.14.5. This flaw stems from the plugin&rsquo;s use of the <code>maybe_unserialize()</code> function on the attacker-controlled <code>args</code> POST parameter passed to the <code>wppb_request_users_pins_action_callback()</code> AJAX handler. Critically, this handler lacks nonce verification, input validation, and type checking, making it accessible to unauthenticated users via both <code>wp_ajax_</code> and <code>wp_ajax_nopriv_</code> hooks. Successful exploitation allows remote, unauthenticated attackers to inject arbitrary PHP objects into the application&rsquo;s memory space, potentially leading to remote code execution depending on available classes and application configuration. The vulnerability was published on 2026-05-02.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 3.14.5) of the Profile Builder Pro plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress AJAX endpoint (<code>/wp-admin/admin-ajax.php</code>).</li>
<li>The POST request includes the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code>.</li>
<li>The POST request includes the <code>args</code> parameter containing a serialized PHP object designed to trigger arbitrary code execution upon deserialization.</li>
<li>The WordPress server receives the request and invokes the <code>wppb_request_users_pins_action_callback()</code> function.</li>
<li>The vulnerable function calls <code>maybe_unserialize()</code> on the attacker-controlled <code>args</code> parameter without proper sanitization or validation.</li>
<li>The malicious PHP object is deserialized and injected into the application&rsquo;s memory space.</li>
<li>The injected object&rsquo;s methods and properties are triggered, leading to arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary PHP code on the target WordPress server. This can lead to complete system compromise, including data theft, website defacement, and the installation of backdoors for persistent access. Given the widespread use of WordPress and the Profile Builder Pro plugin, a large number of websites are potentially at risk until the plugin is updated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Profile Builder Pro plugin to the latest available version to patch CVE-2026-7647.</li>
<li>Deploy the provided Sigma rule <code>Detect Profile Builder Pro PHP Object Injection Attempt</code> to detect exploitation attempts targeting the vulnerable AJAX endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code> and suspicious serialized data in the <code>args</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>php-object-injection</category><category>wordpress</category><category>plugin</category><category>rce</category></item><item><title>ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</guid><description>The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5464, exists in the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin, affecting all versions up to and including 9.1.2. The vulnerability allows authenticated attackers with Editor-level access or higher, who also possess the &rsquo;exactmetrics_view_dashboard&rsquo; capability, to install and activate arbitrary WordPress plugins from attacker-controlled URLs. This is possible due to the exposure of the &lsquo;onboarding_key&rsquo; transient and the lack of proper authorization checks on the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Successful exploitation can lead to Remote Code Execution (RCE) on the target WordPress site. This poses a significant risk to websites using the vulnerable plugin, as attackers can inject malicious code and gain full control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site as an Editor or Administrator.</li>
<li>The attacker obtains the &lsquo;onboarding_key&rsquo; by accessing the reports page, which exposes the transient value to users with the &rsquo;exactmetrics_view_dashboard&rsquo; capability.</li>
<li>The attacker uses the &lsquo;onboarding_key&rsquo; to access the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint, receiving a one-time hash (OTH) token.</li>
<li>The attacker crafts a malicious plugin ZIP file hosted on an attacker-controlled server.</li>
<li>The attacker sends a request to the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint, providing the OTH token and the URL of the malicious plugin ZIP file via the &lsquo;file&rsquo; parameter. This endpoint lacks capability checks and nonce verification.</li>
<li>The ExactMetrics plugin downloads the malicious plugin ZIP file from the attacker-controlled URL.</li>
<li>The ExactMetrics plugin installs and activates the malicious plugin.</li>
<li>The attacker gains Remote Code Execution on the WordPress server through the installed malicious plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5464 allows attackers to install arbitrary plugins on vulnerable WordPress sites, leading to Remote Code Execution. This grants the attacker complete control over the compromised website, enabling them to inject malicious code, deface the site, steal sensitive data, or use the site for further malicious activities. The number of affected websites depends on the widespread use of the ExactMetrics plugin. Organizations using this plugin are at risk of significant data breaches and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin to the latest version, which patches CVE-2026-5464.</li>
<li>Monitor web server logs for suspicious requests to the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint and the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Implement the Sigma rule provided below to detect exploitation attempts.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to WordPress accounts.</li>
<li>Restrict the &rsquo;exactmetrics_view_dashboard&rsquo; capability to only the necessary users.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>rce</category><category>cve-2026-5464</category><category>exactmetrics</category></item></channel></rss>