<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wordpress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/wordpress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 19:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/wordpress/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</link><pubDate>Mon, 04 May 2026 19:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</guid><description>The Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.</description><content:encoded><![CDATA[<p>The Contact Form 7 WordPress plugin, specifically versions up to 2.6.7, contains an uncontrolled resource consumption vulnerability (CVE-2026-25863) within the <code>Wpcf7cfMailParser</code> class. The <code>hide_hidden_mail_fields_regex_callback()</code> method is susceptible to unbounded loop execution due to reading an iteration count directly from user-supplied POST parameters via the REST API endpoint without proper validation. This allows unauthenticated attackers to send a large integer value, triggering multiple <code>preg_replace()</code> operations, leading to server memory exhaustion and crashing the PHP process. This vulnerability enables a denial-of-service condition, potentially impacting all websites using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using Contact Form 7 plugin version 2.6.7 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress REST API endpoint.</li>
<li>The POST request includes a large integer value for the iteration count parameter, which is passed directly to the <code>hide_hidden_mail_fields_regex_callback()</code> method.</li>
<li>The <code>hide_hidden_mail_fields_regex_callback()</code> method, lacking input validation, reads the attacker-controlled integer.</li>
<li>The method initiates an unbounded loop, performing <code>preg_replace()</code> operations based on the attacker-supplied iteration count.</li>
<li>Each <code>preg_replace()</code> operation consumes server memory.</li>
<li>The excessive number of iterations rapidly exhausts available server memory.</li>
<li>The PHP process crashes due to memory exhaustion, resulting in a denial-of-service condition for the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition. Attackers can crash the PHP process on vulnerable WordPress websites by exhausting server memory. This can result in website downtime, impacting user experience and potentially leading to data loss or corruption. While the exact number of affected websites is unknown, the widespread use of Contact Form 7 makes this vulnerability a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Contact Form 7 WordPress plugin to a version greater than 2.6.7 to patch CVE-2026-25863.</li>
<li>Deploy the Sigma rule <code>Detect Contact Form 7 Uncontrolled Resource Consumption Attempt</code> to your SIEM to detect malicious POST requests targeting the WordPress REST API.</li>
<li>Monitor web server logs for abnormally large POST request sizes to the WordPress REST API endpoint, as this may indicate an attempted exploitation of CVE-2026-25863.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>resource-exhaustion</category><category>denial-of-service</category><category>cve-2026-25863</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item><item><title>NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</link><pubDate>Sun, 03 May 2026 06:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</guid><description>The NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The NEX-Forms – Ultimate Forms Plugin for WordPress, versions up to and including 9.1.11, is susceptible to a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5063). This flaw stems from inadequate input sanitization and output escaping within the <code>submit_nex_form()</code> function. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code through POST parameter key names. Successful exploitation allows the attacker to execute arbitrary scripts in the context of a user&rsquo;s browser when they access a page containing the injected script, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability was reported to Wordfence and a patch has been released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP POST request to a WordPress page that utilizes the vulnerable NEX-Forms plugin.</li>
<li>The POST request includes specially crafted parameter key names designed to inject JavaScript code.</li>
<li>The <code>submit_nex_form()</code> function processes the POST request without properly sanitizing or escaping the malicious input.</li>
<li>The injected JavaScript code is stored in the WordPress database.</li>
<li>A legitimate user accesses a page where the form data, including the malicious script, is displayed.</li>
<li>The stored JavaScript code executes within the user&rsquo;s browser in the context of the WordPress page.</li>
<li>The attacker can then perform actions such as stealing cookies, redirecting the user, or modifying the page content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to inject arbitrary JavaScript code into pages using the NEX-Forms plugin. This can lead to various malicious outcomes, including user session hijacking, website defacement, or redirection to phishing sites. As the vulnerability is stored, every user who visits a page containing the malicious script will be affected until the vulnerability is patched and the malicious input is removed. The severity is rated as HIGH with a CVSS base score of 7.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the NEX-Forms – Ultimate Forms Plugin for WordPress to a version beyond 9.1.11 to patch CVE-2026-5063.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NEX-Forms POST Requests</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests containing potentially malicious JavaScript code in parameter names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-5063</category></item><item><title>WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</link><pubDate>Sat, 02 May 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</guid><description>The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.</description><content:encoded><![CDATA[<p>The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin, a popular WordPress plugin, is affected by an Insecure Direct Object Reference (IDOR) vulnerability. This flaw, present in versions up to and including 6.7.25, stems from a lack of proper validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function. An attacker with Vendor-level privileges or higher can exploit this vulnerability to delete any user account on the WordPress instance, including those with administrative rights. This can lead to complete compromise of the affected website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Vendor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>wcfm_delete_wcfm_customer</code> function.</li>
<li>The attacker includes the <code>customerid</code> parameter in the request, setting its value to the ID of the target user account they wish to delete.</li>
<li>Due to the missing validation on the <code>customerid</code> parameter, the application directly uses the provided ID to locate the user account.</li>
<li>The <code>wcfm_delete_wcfm_customer</code> function proceeds to delete the user account identified by the attacker-supplied <code>customerid</code>.</li>
<li>The targeted user account is successfully deleted from the WordPress instance.</li>
<li>If the deleted user account was an administrator, the attacker can effectively take control of the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability allows an attacker to delete arbitrary user accounts, including those with administrative privileges. This can lead to a complete compromise of the affected WordPress website. An attacker could then deface the website, steal sensitive data, or use it to launch further attacks. Due to the popularity of the plugin, a large number of WooCommerce stores are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest available patch or upgrade to a version of the WCFM plugin greater than 6.7.25 to remediate CVE-2026-2554.</li>
<li>Monitor web server logs for suspicious requests to <code>wcfm_delete_wcfm_customer</code> with unusual <code>customerid</code> values, using the Sigma rule provided below.</li>
<li>Implement input validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function to prevent arbitrary user deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>wordpress</category><category>woocommerce</category><category>account-deletion</category></item><item><title>Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</guid><description>The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.</description><content:encoded><![CDATA[<p>The Salon Booking System – Free Version plugin for WordPress, versions up to and including 10.30.25, contains an arbitrary file read vulnerability. This flaw stems from the plugin&rsquo;s public booking flow, where it accepts attacker-controlled file-field values. These values are subsequently used as trusted paths when creating email attachments for booking confirmations. This allows an unauthenticated attacker to supply a path to any file accessible to the web server, triggering its inclusion as an attachment in the booking confirmation email, effectively enabling arbitrary file exfiltration. Exploitation requires no authentication and can be triggered remotely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker accesses the public booking form of a WordPress site running the vulnerable Salon Booking System plugin.</li>
<li>The attacker crafts a malicious request to the booking form, injecting a file path (e.g., <code>/etc/passwd</code>) into a file-field parameter.</li>
<li>The plugin processes the booking request and stores the attacker-supplied file path.</li>
<li>The plugin generates a booking confirmation email.</li>
<li>The plugin uses the stored, attacker-controlled file path to attach the specified file to the confirmation email.</li>
<li>The booking confirmation email, now containing the arbitrary file as an attachment, is sent to the user who initiated the booking (which could be the attacker or an unwitting third party).</li>
<li>The attacker retrieves the email (if sent to the attacker) or intercepts it (if sent to a third party) and extracts the attached file.</li>
<li>The attacker gains unauthorized access to the contents of the exfiltrated file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files from the affected WordPress server. This could lead to the disclosure of sensitive information, such as configuration files, database credentials, or other confidential data. The vulnerability affects versions of the Salon Booking System plugin up to and including 10.30.25. The number of affected WordPress installations is unknown, but could be substantial given the plugin&rsquo;s popularity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Salon Booking System plugin to the latest version to patch CVE-2026-6320.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing absolute or relative file paths in file-field parameters, using a detection rule similar to the ones provided below.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, especially file paths.</li>
<li>Review and restrict file system permissions to limit the files accessible to the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>wordpress</category><category>plugin-vulnerability</category><category>cve</category></item><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</guid><description>The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.</description><content:encoded><![CDATA[<p>CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>scan_video</code> parameter as an SSRF entry point.</li>
<li>The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the <code>scan_video</code> parameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname).</li>
<li>The WordPress server receives the malicious request.</li>
<li>The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the <code>scan_video</code> parameter.</li>
<li>The WordPress server makes a request to the internal resource.</li>
<li>The response from the internal resource is received by the WordPress server.</li>
<li>The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker&rsquo;s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PixelYourSite Pro SSRF Attempts</code> to monitor for exploitation attempts targeting the <code>scan_video</code> parameter.</li>
<li>Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>wordpress</category><category>plugin</category></item><item><title>Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)</title><link>https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a popular form builder, contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-5113. This flaw affects versions up to and including 2.10.0. The vulnerability stems from a flawed state validation mechanism combined with insufficient output escaping within the Consent field&rsquo;s hidden inputs. An unauthenticated attacker can exploit this by injecting malicious JavaScript code into form entries. This malicious code is then executed when an authenticated administrator accesses the Entries List page within the WordPress administration panel, potentially leading to account compromise or other malicious actions performed within the administrator&rsquo;s session. Successful exploitation allows attackers to execute arbitrary web scripts in the context of an administrator&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing XSS code within a Gravity Forms Consent field. The payload leverages HTML tags like <code>&lt;svg&gt;</code> that <code>wp_kses()</code> will strip.</li>
<li>The attacker submits the crafted form entry to the WordPress site.</li>
<li>The Gravity Forms plugin&rsquo;s state validation mechanism calculates two hashes: one for the raw input and another after sanitization via <code>wp_kses()</code>.</li>
<li>Due to the nature of the XSS payload, the <code>wp_kses()</code> function strips the <code>&lt;svg&gt;</code> tag, resulting in a matching hash for the sanitized input.</li>
<li>The flawed validation logic fails to detect the malicious intent because at least one hash matches the original state, allowing the malicious raw value (containing the XSS payload) to be stored in the database.</li>
<li>An authenticated administrator logs into the WordPress administration panel.</li>
<li>The administrator navigates to the Entries List page for the affected Gravity Form.</li>
<li>The stored malicious consent label is retrieved from the database and output without proper escaping, causing the XSS payload to execute within the administrator&rsquo;s browser session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5113 allows unauthenticated attackers to execute arbitrary web scripts within the context of an authenticated administrator&rsquo;s browser session. This can lead to a variety of malicious outcomes, including account compromise, data theft, modification of website content, or further propagation of the attack to other administrative users. The severity of the impact depends on the privileges held by the compromised administrator account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to the latest version, which includes a fix for CVE-2026-5113.</li>
<li>Implement a Web Application Firewall (WAF) rule to filter out requests containing potentially malicious XSS payloads targeting the Gravity Forms Consent field.</li>
<li>Monitor web server logs for suspicious activity related to form submissions containing encoded or obfuscated JavaScript code. Analyze HTTP request parameters for unusual characters or patterns indicative of XSS attempts.</li>
<li>Enable output escaping on form entries to prevent stored XSS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category><category>cve-2026-5113</category><category>stored-xss</category></item><item><title>WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</guid><description>The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.</description><content:encoded><![CDATA[<p>The WP Mail Gateway plugin, a WordPress extension, contains a vulnerability (CVE-2026-6963) that allows authenticated users with minimal privileges (Subscriber level or higher) to gain administrative access. The flaw resides in the <code>wmg_save_provider_config</code> AJAX action, which lacks proper authorization checks. This omission enables attackers to manipulate SMTP settings, redirect outgoing emails, and ultimately trigger password reset emails intended for administrators. The vulnerability affects all versions of the WP Mail Gateway plugin up to and including version 1.8. Successful exploitation grants attackers complete control over the WordPress site, making it a critical security concern for any organization using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs into a WordPress site with a Subscriber-level account or higher.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wmg_save_provider_config</code> action.</li>
<li>This request modifies the SMTP settings, redirecting outgoing emails to an attacker-controlled server.</li>
<li>The attacker initiates a password reset request for an administrator account.</li>
<li>The password reset email is intercepted by the attacker&rsquo;s server.</li>
<li>The attacker uses the password reset link to gain access to the administrator&rsquo;s account.</li>
<li>The attacker logs into the WordPress dashboard with administrator privileges.</li>
<li>The attacker can now perform any administrative action, including installing malicious plugins, modifying site content, or creating new administrator accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6963 allows an attacker to completely compromise a WordPress website.  Even low-privileged users can elevate their access to administrator, giving them full control over the site.  This can lead to data breaches, website defacement, malware deployment, and other malicious activities. The vulnerability affects all installations of the WP Mail Gateway plugin up to version 1.8, potentially impacting thousands of WordPress sites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Mail Gateway plugin to a version beyond 1.8 to patch CVE-2026-6963.</li>
<li>Monitor WordPress logs for suspicious AJAX requests targeting the <code>wmg_save_provider_config</code> action using the Sigma rule provided below. Enable webserver logging to capture HTTP POST requests.</li>
<li>Implement the provided Sigma rule to detect modifications to WordPress options related to SMTP configuration. Enable relevant logging for registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>plugin-vulnerability</category></item><item><title>WordPress User Verification Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</guid><description>The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.</description><content:encoded><![CDATA[<p>The User Verification by PickPlugins plugin, a popular WordPress plugin, contains a critical authentication bypass vulnerability (CVE-2026-7458) affecting all versions up to and including 2.0.46. The flaw resides within the <code>user_verification_form_wrap_process_otpLogin</code> function, where a loose PHP comparison operator is used to validate OTP codes. This weakness allows unauthenticated attackers to bypass the OTP verification process and log in as any user with a verified email address, potentially gaining administrative access. Successful exploitation requires the attacker to submit the string &ldquo;true&rdquo; as the OTP value. This vulnerability poses a significant risk to WordPress sites using the affected plugin, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the User Verification by PickPlugins plugin (&lt;= 2.0.46).</li>
<li>The attacker navigates to the OTP login form provided by the plugin.</li>
<li>The attacker enters the email address of a target user, such as an administrator.</li>
<li>The attacker intercepts the OTP request and instead of a numerical code, submits the string &ldquo;true&rdquo; as the OTP value.</li>
<li>The vulnerable <code>user_verification_form_wrap_process_otpLogin</code> function processes the submitted OTP. Due to the loose PHP comparison (e.g., <code>==</code> instead of <code>===</code>), the string &ldquo;true&rdquo; evaluates to <code>true</code>, bypassing the intended OTP validation.</li>
<li>The plugin incorrectly authenticates the attacker as the targeted user.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s account, potentially gaining administrative privileges.</li>
<li>The attacker can now perform actions such as modifying website content, installing malicious plugins, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7458 allows unauthenticated attackers to bypass the OTP verification mechanism and gain unauthorized access to any user account with a verified email address on a vulnerable WordPress site. This can lead to complete compromise of the affected WordPress site, enabling attackers to modify content, inject malicious code, steal sensitive data, or use the site for malicious purposes. Given the plugin&rsquo;s popularity, this vulnerability could impact a large number of WordPress websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Verification by PickPlugins plugin to the latest version (greater than 2.0.46) to patch CVE-2026-7458.</li>
<li>Monitor WordPress access logs for unusual login attempts or the presence of &ldquo;true&rdquo; as OTP values to identify potential exploitation attempts. Deploy the <code>Detect Successful Authentication Bypass via True OTP</code> Sigma rule.</li>
<li>Implement stricter input validation and sanitization for OTP codes to prevent similar bypass vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>wordpress</category><category>authentication bypass</category><category>cve-2026-7458</category></item><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item><item><title>BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</guid><description>CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.</description><content:encoded><![CDATA[<p>BuddyPress Xprofile Custom Fields Type 2.6.3 is vulnerable to a remote code execution vulnerability, identified as CVE-2018-25308. This flaw enables authenticated users to execute arbitrary code on the server by deleting arbitrary files. The attack involves manipulating unescaped POST parameters, specifically <code>field_hiddenfile</code> and <code>field_deleteimg</code>, during profile editing actions. Successful exploitation allows attackers to unlink files from the server, potentially disrupting services or gaining unauthorized access. This vulnerability was published on 2026-04-29 and poses a significant threat to BuddyPress installations that have not applied the necessary patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a BuddyPress site running the vulnerable Xprofile Custom Fields Type 2.6.3 plugin.</li>
<li>The attacker navigates to their profile editing page.</li>
<li>The attacker crafts a malicious HTTP POST request to the profile update endpoint.</li>
<li>Within the POST request, the <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameters are manipulated to point to arbitrary files on the server.</li>
<li>The server-side script processes the crafted POST request without proper sanitization or validation of the file paths.</li>
<li>The <code>unlink()</code> function or an equivalent file deletion function is called with the attacker-controlled file paths.</li>
<li>The targeted files are deleted from the server file system.</li>
<li>The attacker can potentially delete critical system files or web application files, leading to remote code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25308 allows authenticated attackers to delete arbitrary files on the server. This can lead to a denial-of-service condition if critical system files are removed. The vulnerability can also potentially lead to remote code execution if the attacker is able to delete and replace executable files or inject malicious code into configuration files. While the number of victims is unknown, all BuddyPress installations using the vulnerable plugin are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for BuddyPress Xprofile Custom Fields Type to address CVE-2018-25308.</li>
<li>Implement input validation and sanitization on the server-side to prevent manipulation of file paths in POST parameters.</li>
<li>Monitor web server logs for suspicious POST requests targeting the profile update endpoint with unusual <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameter values (reference the attack chain).</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts based on the manipulation of specific POST parameters (reference the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>file-deletion</category><category>wordpress</category></item><item><title>WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-create-db-tables-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 09:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-create-db-tables-auth-bypass/</guid><description>The Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.</description><content:encoded><![CDATA[<p>The Create DB Tables plugin, versions 1.2.1 and earlier, suffers from an authorization bypass vulnerability (CVE-2026-4119). This flaw stems from the plugin&rsquo;s failure to implement capability checks or nonce verification for its admin_post action hooks, specifically those responsible for creating (admin_post_add_table) and deleting (admin_post_delete_db_table) database tables. Because the admin_post hook only requires a user to be logged in, any authenticated user, including those with the lowest Subscriber role, can access these endpoints. This oversight allows malicious actors to create arbitrary database tables or, more critically, delete existing ones, including vital WordPress core tables. The vulnerability was published on 2026-04-22, and given the severity, defenders should immediately address this risk. The affected versions of the plugin should be updated or removed to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers an account on a vulnerable WordPress site, gaining Subscriber-level access.</li>
<li>The attacker crafts a POST request to <code>wp-admin/admin-post.php</code> with the action parameter set to <code>add_table</code> or <code>delete_db_table</code>.</li>
<li>The attacker provides the <code>db_table</code> parameter with the name of the table to be deleted, if exploiting the <code>delete_db_table</code> action.</li>
<li>The server processes the request without proper authorization checks, because <code>current_user_can()</code> and <code>wp_verify_nonce()</code> are missing.</li>
<li>The <code>cdbt_delete_db_table()</code> function executes a <code>DROP TABLE</code> SQL query based on the user-supplied <code>db_table</code> parameter.</li>
<li>If the attacker targets a critical WordPress core table like <code>wp_users</code> or <code>wp_options</code>, the site&rsquo;s functionality will be severely impacted.</li>
<li>Alternatively, if exploiting the <code>add_table</code> action, the <code>cdbt_create_new_table()</code> function executes a <code>CREATE TABLE</code> SQL query, creating an arbitrary database table.</li>
<li>Successful exploitation can lead to complete destruction of the WordPress installation or the introduction of malicious database tables.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any authenticated user to delete arbitrary database tables, including critical WordPress core tables. This can lead to complete site destruction and data loss. An attacker could delete the <code>wp_users</code> table, effectively locking out all administrators and other users, or delete the <code>wp_options</code> table, causing the site to revert to its default state or become completely unusable. The CVSS v3.1 base score for this vulnerability is 9.1, highlighting the critical nature of the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Create DB Tables plugin to a version higher than 1.2.1, where this vulnerability is patched.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-post.php</code> with <code>action=delete_db_table</code> or <code>action=add_table</code> (see rule: &ldquo;Detect Unauthorized DB Table Modification&rdquo;).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests to <code>wp-admin/admin-post.php</code> with the vulnerable actions unless originating from an administrator (see rule: &ldquo;WAF - Block Unauthorized DB Table Modification&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>authorization-bypass</category><category>plugin-vulnerability</category><category>cve-2026-4119</category></item><item><title>WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</link><pubDate>Wed, 22 Apr 2026 09:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</guid><description>The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.</description><content:encoded><![CDATA[<p>The HTTP Headers plugin for WordPress, versions up to and including 1.19.2, is vulnerable to remote code execution (RCE) due to a file path manipulation vulnerability (CVE-2026-4132). This vulnerability stems from the plugin&rsquo;s insufficient validation of the &lsquo;hh_htpasswd_path&rsquo; option, which controls the location of the .htpasswd file. Furthermore, the &lsquo;hh_www_authenticate_user&rsquo; option, used for setting the username for HTTP Basic Authentication, lacks proper sanitization. This allows attackers with administrator privileges to specify an arbitrary file path for the htpasswd file and inject unsanitized content into it. By crafting a malicious username containing PHP code and setting the htpasswd path to a web-accessible directory, an attacker can execute arbitrary code on the server. This exploit requires administrator-level access to the WordPress dashboard.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the WordPress dashboard with administrator privileges.</li>
<li>The attacker navigates to the HTTP Headers plugin settings page.</li>
<li>The attacker modifies the &lsquo;hh_htpasswd_path&rsquo; option, setting it to a web-accessible directory (e.g., <code>/var/www/html/wp-content/uploads/.shell.php</code>).</li>
<li>The attacker modifies the &lsquo;hh_www_authenticate_user&rsquo; option, injecting PHP code into the username field (e.g., <code>&lt;?php system($_GET['cmd']); ?&gt;</code>).</li>
<li>The <code>apache_auth_credentials()</code> function uses sprintf to combine the malicious username with a SHA hash, creating a crafted htpasswd entry.</li>
<li>The <code>update_auth_credentials()</code> function then writes the crafted content, including the injected PHP code, to the attacker-controlled file path using <code>file_put_contents()</code>.</li>
<li>The attacker accesses the newly created PHP file via a web browser (e.g., <code>http://example.com/wp-content/uploads/.shell.php?cmd=id</code>).</li>
<li>The injected PHP code executes, allowing the attacker to run arbitrary commands on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants the attacker remote code execution on the affected WordPress server. This can lead to complete compromise of the server, including data theft, website defacement, malware deployment, and further attacks against internal networks. Given the widespread use of WordPress and its plugins, a successful exploit could impact a large number of websites and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the HTTP Headers plugin to a patched version (if available) to remediate CVE-2026-4132.</li>
<li>Monitor web server logs for requests to unusual file paths that match the &lsquo;hh_htpasswd_path&rsquo; setting specified in the plugin configuration to detect potential exploitation attempts.</li>
<li>Implement the Sigma rule to detect file creation events in web-accessible directories with PHP extensions that are triggered by the web server process.</li>
<li>Restrict access to the WordPress administrator dashboard to only trusted individuals and enforce strong password policies to prevent unauthorized access to plugin settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category><category>cve-2026-4132</category></item><item><title>MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</link><pubDate>Tue, 21 Apr 2026 10:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</guid><description>A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-39467 is a critical vulnerability affecting the MetaSlider Responsive Slider plugin for WordPress. Specifically, it is a Deserialization of Untrusted Data vulnerability that can lead to Object Injection. The vulnerability exists in versions up to and including 3.106.0. An attacker can exploit this vulnerability to inject arbitrary PHP objects into the application, potentially leading to remote code execution. This is possible because the plugin deserializes data without proper validation, allowing malicious actors to manipulate serialized data and inject harmful objects. The vulnerability was reported by Patchstack. Given the widespread use of WordPress and the MetaSlider plugin, this vulnerability poses a significant risk to a large number of websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends a crafted HTTP request to a WordPress endpoint that processes MetaSlider plugin data.</li>
<li>The request contains a serialized PHP object designed for malicious purposes.</li>
<li>The MetaSlider plugin deserializes the untrusted data without proper sanitization or validation using <code>unserialize()</code>.</li>
<li>The deserialization process instantiates the malicious PHP object.</li>
<li>The injected object executes its malicious payload, potentially writing files to the server.</li>
<li>The attacker leverages the file write capability to plant a PHP webshell in the WordPress uploads directory.</li>
<li>The attacker accesses the webshell via a direct HTTP request.</li>
<li>The attacker executes arbitrary commands on the server via the webshell, gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39467 allows an unauthenticated attacker to inject arbitrary PHP objects, leading to remote code execution on the target WordPress server. This could result in complete compromise of the website, including data theft, defacement, or further attacks on internal networks. Given the popularity of MetaSlider, potentially thousands of websites are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MetaSlider Responsive Slider plugin to the latest version to patch CVE-2026-39467.</li>
<li>Implement the Sigma rule <code>Detect MetaSlider Object Injection Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests containing serialized PHP objects to WordPress endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>object-injection</category><category>deserialization</category><category>cve-2026-39467</category></item><item><title>Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</link><pubDate>Mon, 20 Apr 2026 20:35:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, versions 3.4.4 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-5478). This flaw stems from the plugin&rsquo;s improper handling of the <code>old_files</code> parameter within form submissions. Specifically, the plugin trusts attacker-controlled data as legitimate server-side upload state and insecurely converts URLs into local filesystem paths without adequate sanitization. This lack of input validation enables unauthenticated attackers to inject path traversal sequences, leading to the disclosure of sensitive files like <code>wp-config.php</code>, which contains database credentials and authentication salts. Furthermore, the flawed path resolution is utilized in a post-email cleanup routine, resulting in arbitrary file deletion via the <code>unlink()</code> function, potentially causing a denial-of-service condition. Successful exploitation requires a form with a file-upload or image-upload field and the &ldquo;store entry information&rdquo; feature disabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP POST request to a WordPress page containing an Everest Forms form with a file upload field.</li>
<li>The attacker includes the <code>old_files</code> parameter in the POST data, injecting a path traversal payload (e.g., <code>../../../../wp-config.php</code>) into its value.</li>
<li>The WordPress application processes the form submission, and the Everest Forms plugin extracts the <code>old_files</code> parameter.</li>
<li>The plugin&rsquo;s flawed logic converts the attacker-supplied URL into a local file system path using regex-based string replacement without canonicalization or directory boundary enforcement.</li>
<li>The plugin attaches the resolved file (e.g., <code>/var/www/wordpress/../../../../wp-config.php</code>) to the notification email.</li>
<li>After sending the notification email, the post-email cleanup routine utilizes the same flawed path resolution to determine the file to delete.</li>
<li>The <code>unlink()</code> function is called on the resolved path, leading to the deletion of the targeted file (e.g., <code>wp-config.php</code>).</li>
<li>The attacker gains access to sensitive information (database credentials, salts) or causes a denial of service by deleting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5478 allows unauthenticated attackers to read arbitrary files on the WordPress server, potentially exposing sensitive information like database credentials and authentication salts stored in <code>wp-config.php</code>. This could lead to full site compromise, including data theft, defacement, or further malicious activities. Furthermore, the ability to delete arbitrary files enables attackers to cause a denial-of-service condition by removing critical system or application files. The impact is significant as it affects all versions of the Everest Forms plugin up to and including 3.4.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to a version higher than 3.4.4 to patch CVE-2026-5478.</li>
<li>Deploy the Sigma rule &ldquo;Detect Everest Forms Arbitrary File Read Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enable web server logging to capture HTTP POST requests, which are crucial for detecting path traversal attempts (cs-uri-query, cs-method in webserver logs).</li>
<li>Monitor file deletion events on the WordPress server, especially those initiated by the web server user, using a file integrity monitoring (FIM) solution (file_event logs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>cve-2026-5478</category></item><item><title>WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</link><pubDate>Fri, 17 Apr 2026 17:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</guid><description>The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The WP Customer Area plugin, a popular WordPress plugin, is susceptible to an arbitrary file read and deletion vulnerability. This flaw, identified as CVE-2026-3464, resides within the &lsquo;ajax_attach_file&rsquo; function and stems from inadequate file path validation. All versions of the plugin up to and including 8.3.4 are affected. The vulnerability enables authenticated attackers with minimal privileges (e.g., Subscriber), granted access by an administrator, to read arbitrary files on the server, potentially exposing sensitive data. Attackers can also delete arbitrary files, which, in certain cases (such as deleting <code>wp-config.php</code>), can pave the way for remote code execution. This vulnerability poses a significant risk to WordPress websites utilizing the WP Customer Area plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site with the WP Customer Area plugin enabled, with privileges granted by an administrator (e.g., as a Subscriber).</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;ajax_attach_file&rsquo; function.</li>
<li>The crafted request includes a manipulated file path, bypassing input validation.</li>
<li>The plugin, failing to properly sanitize the file path, attempts to read or delete the file specified in the malicious request.</li>
<li>If reading, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>If deleting, the targeted file is removed from the server.</li>
<li>If the attacker targets a sensitive file, such as <code>wp-config.php</code>, and successfully deletes it, the WordPress installation becomes unstable and potentially allows for re-installation and control by the attacker.</li>
<li>The attacker exploits the instability to achieve remote code execution, potentially installing a web shell or other malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3464) allows attackers to read sensitive files, potentially including database credentials, API keys, and other confidential information. Moreover, the ability to delete arbitrary files can lead to denial-of-service conditions or, more critically, remote code execution. The number of affected websites is potentially large, given the popularity of the WP Customer Area plugin. A successful attack can result in complete compromise of the WordPress website and its underlying server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Customer Area plugin to a version greater than 8.3.4 to patch CVE-2026-3464.</li>
<li>Monitor web server logs for requests containing suspicious file paths targeting the &lsquo;ajax_attach_file&rsquo; function (see Sigma rule below).</li>
<li>Implement stricter file path validation on the web server to prevent arbitrary file access.</li>
<li>Apply the provided Sigma rules to your SIEM to detect and alert on malicious attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>rce</category></item><item><title>Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</link><pubDate>Fri, 17 Apr 2026 07:23:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</guid><description>The Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.</description><content:encoded><![CDATA[<p>The Unlimited Elements for Elementor plugin, versions 2.0.6 and earlier, contains an arbitrary file read vulnerability (CVE-2026-4659). This vulnerability stems from inadequate sanitization of path traversal sequences within the <code>URLtoRelative()</code> and <code>urlToPath()</code> functions, particularly when combined with the ability to enable debug output. The <code>URLtoRelative()</code> function inadequately strips the base URL without properly sanitizing path traversal characters (<code>../</code>). Successful exploitation allows authenticated attackers with Author-level permissions or higher to access and read arbitrary local files on the WordPress host. This can include sensitive configuration files like <code>wp-config.php</code>, potentially exposing database credentials and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application with Author-level or higher privileges.</li>
<li>The attacker identifies the <code>Repeater JSON/CSV URL</code> parameter within the Unlimited Elements widget settings.</li>
<li>The attacker crafts a malicious URL containing path traversal sequences (e.g., <code>http://site.com/../../../../etc/passwd</code>) in the <code>Repeater JSON/CSV URL</code> parameter.</li>
<li>The crafted URL is passed to the <code>URLtoRelative()</code> function, which removes the base URL but fails to sanitize the path traversal sequences.</li>
<li>The resulting path (e.g., <code>/../../../../etc/passwd</code>) is concatenated with the base path by the application.</li>
<li>The <code>cleanPath()</code> function normalizes directory separators, but does not remove traversal components, leaving the path vulnerable.</li>
<li>The application resolves the path, leading to access of the targeted file (e.g., <code>/etc/passwd</code>).</li>
<li>The attacker retrieves the contents of the arbitrary file, such as <code>wp-config.php</code>, potentially extracting sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to read arbitrary files on the WordPress host. This can lead to the exposure of sensitive data, including database credentials, API keys, and other configuration settings stored in files like <code>wp-config.php</code>. The impact ranges from data leakage to potential full compromise of the WordPress installation and the underlying server, depending on the contents of the accessed files and the attacker&rsquo;s subsequent actions. The number of potentially affected WordPress sites is substantial, given the popularity of the Elementor plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Unlimited Elements for Elementor plugin to a version greater than 2.0.6 to patch CVE-2026-4659.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (<code>../</code>) in the URI, focusing on requests targeting WordPress plugins; use the provided Sigma rule to facilitate this detection.</li>
<li>Implement stricter input validation and sanitization for URL parameters within WordPress plugins, specifically when handling file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-read</category><category>path-traversal</category><category>cve-2026-4659</category></item><item><title>Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)</title><link>https://feed.craftedsignal.io/briefs/2026-04-plisio-auth-bypass/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-plisio-auth-bypass/</guid><description>A missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.</description><content:encoded><![CDATA[<p>CVE-2026-6372 is a missing authorization vulnerability affecting the Plisio Accept Cryptocurrencies with Plisio WordPress plugin, specifically versions from initial releases through 2.0.5. Discovered by Patchstack, the vulnerability stems from incorrectly configured access control security levels within the plugin. An attacker can exploit this flaw to bypass payment verification processes, potentially leading to unauthorized transactions or manipulation of payment-related functionalities. Given the increasing adoption of cryptocurrency payments, this vulnerability presents a significant risk to e-commerce sites using the affected plugin. Successful exploitation can result in financial losses and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the vulnerable Plisio plugin (version &lt;= 2.0.5).</li>
<li>Attacker analyzes the plugin&rsquo;s code or intercepts network traffic to identify the specific endpoint or function responsible for payment verification lacking proper authorization checks.</li>
<li>The attacker crafts a malicious HTTP request to the vulnerable endpoint, bypassing the intended authentication or authorization mechanisms.</li>
<li>The crafted request modifies payment parameters (e.g., amount, recipient) without proper validation.</li>
<li>The modified request is sent to the server, which processes it without correctly verifying the user&rsquo;s authority.</li>
<li>The server updates the payment status, marking it as &ldquo;paid&rdquo; or &ldquo;verified,&rdquo; even though the actual payment might be incomplete, altered, or entirely missing.</li>
<li>The WordPress site delivers goods or services based on the fraudulently verified payment status.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6372 allows attackers to bypass payment verification processes in e-commerce sites using the Plisio Accept Cryptocurrencies plugin. This can lead to financial losses for the site owner due to unauthorized transactions. The vulnerability affects all installations using versions up to and including 2.0.5. Given the potential for widespread impact on any site accepting cryptocurrency via this plugin, this issue represents a high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Plisio Accept Cryptocurrencies with Plisio plugin to a version greater than 2.0.5 to patch CVE-2026-6372.</li>
<li>Deploy the Sigma rule <code>Detect Plisio Payment Bypass Attempt</code> to monitor for exploit attempts targeting the vulnerable endpoint.</li>
<li>Examine web server logs for suspicious POST requests to payment processing endpoints associated with the Plisio plugin, filtering for unexpected parameter modifications (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>payment-bypass</category><category>cve-2026-6372</category></item><item><title>AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)</title><link>https://feed.craftedsignal.io/briefs/2026-04-acymailing-privesc/</link><pubDate>Thu, 16 Apr 2026 06:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-acymailing-privesc/</guid><description>The AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.</description><content:encoded><![CDATA[<p>The AcyMailing plugin for WordPress, a popular email marketing tool, contains a critical privilege escalation vulnerability, tracked as CVE-2026-3614. Affecting versions 9.11.0 through 10.8.1, the vulnerability stems from a missing capability check on the <code>wp_ajax_acymailing_router</code> AJAX handler. This oversight allows authenticated attackers with minimal privileges (Subscriber level or higher) to bypass access controls intended to restrict access to administrative functions. Successful exploitation of this flaw allows attackers to perform actions reserved for administrators, including modifying configuration settings, enabling autologin features, and ultimately, compromising the entire WordPress installation. This is a critical vulnerability due to the widespread use of AcyMailing and the potential for complete site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains subscriber-level access to the WordPress site (e.g., through registration or compromised credentials).</li>
<li>Attacker crafts a malicious AJAX request targeting the <code>wp_ajax_acymailing_router</code> endpoint. This request attempts to access admin-only controllers without proper authentication.</li>
<li>Due to the missing capability check, the server processes the request, granting the attacker access to restricted administrative functions within AcyMailing.</li>
<li>The attacker enables the autologin feature within AcyMailing&rsquo;s configuration, using the exposed administrative controller.</li>
<li>The attacker creates a new AcyMailing subscriber.  Crucially, the attacker injects a malicious <code>cms_id</code> value into the subscriber&rsquo;s data. This <code>cms_id</code> is crafted to point to the WordPress user account they wish to impersonate (e.g., an administrator account).</li>
<li>The attacker retrieves the autologin URL generated for the newly created (and malicious) subscriber.</li>
<li>The attacker accesses the autologin URL.</li>
<li>The AcyMailing plugin, configured with the now-enabled autologin feature, authenticates the attacker as the user specified by the injected <code>cms_id</code>, granting them full administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3614 allows an attacker to escalate privileges from a subscriber to an administrator. This grants the attacker complete control over the WordPress website, including the ability to modify content, install malicious plugins, create new administrator accounts, and potentially compromise the underlying server. This vulnerability impacts any WordPress site running a vulnerable version of the AcyMailing plugin (9.11.0 through 10.8.1). The severity is critical due to the ease of exploitation and the potential for complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the AcyMailing plugin to the latest version (greater than 10.8.1) to patch CVE-2026-3614.</li>
<li>Deploy the Sigma rule &ldquo;AcyMailing Unauthorized AJAX Access Attempt&rdquo; to detect attempts to exploit the vulnerability by monitoring for access to the <code>wp_ajax_acymailing_router</code> endpoint from non-administrator users.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action=acymailing_router</code> parameter, as this is the entry point for exploiting CVE-2026-3614.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>acymailing</category></item><item><title>Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</link><pubDate>Thu, 16 Apr 2026 06:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin, a WordPress plugin, is susceptible to SQL Injection attacks. This vulnerability resides within the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint, specifically through the &lsquo;options&rsquo; parameter keys nested within the &lsquo;product_data&rsquo;. All versions of the plugin up to and including 2.1.2 are affected. Due to insufficient input sanitization and inadequate preparation of SQL queries, unauthenticated attackers can inject malicious SQL code. Successful exploitation enables attackers to execute arbitrary SQL queries, potentially leading to sensitive data extraction. This poses a significant risk to WordPress sites utilizing the affected plugin, as attackers could gain access to user credentials, financial information, or other confidential data stored in the database. Defenders should prioritize patching or removing the plugin to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;=2.1.2) of the Riaxe Product Customizer plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint.</li>
<li>The crafted request includes a &lsquo;product_data&rsquo; parameter containing a manipulated &lsquo;options&rsquo; array.</li>
<li>Within the &lsquo;options&rsquo; array, the attacker injects SQL code into one or more of the parameter keys.</li>
<li>The WordPress server processes the request without properly sanitizing the injected SQL code.</li>
<li>The application constructs a SQL query using the unsanitized input, effectively injecting the malicious code into the query.</li>
<li>The database server executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, by using the SQL injection vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-3599) allows unauthenticated attackers to extract sensitive information from the WordPress database. This may include user credentials (usernames, email addresses, and password hashes), customer data, financial information, and other confidential data stored within the database. The impact can range from defacement of the website and data theft, to complete compromise of the WordPress site and its associated server. Due to the widespread use of WordPress and its plugins, this vulnerability poses a significant threat to a potentially large number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Riaxe Product Customizer plugin to a version higher than 2.1.2 to patch CVE-2026-3599.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts via Riaxe Product Customizer Plugin</code> to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>sqli</category><category>plugin</category></item><item><title>Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</link><pubDate>Thu, 16 Apr 2026 06:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-privesc/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin for WordPress, versions 2.1.2 and earlier, contains a critical privilege escalation vulnerability (CVE-2026-3596). This flaw stems from an unauthenticated AJAX action, &lsquo;wp_ajax_nopriv_install-imprint&rsquo;, which is improperly secured. The corresponding function, <code>ink_pd_add_option()</code>, allows unauthenticated users to modify arbitrary WordPress options by sending POST requests. There are no nonce checks, capability checks, or input validation performed on the &lsquo;option&rsquo; and &lsquo;opt_value&rsquo; parameters, making it trivial to manipulate sensitive site settings. Successful exploitation allows attackers to grant themselves administrative privileges. This vulnerability poses a significant risk to any WordPress site using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the Riaxe Product Customizer plugin (&lt;= 2.1.2).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes the <code>action</code> parameter set to <code>install-imprint</code>, triggering the vulnerable AJAX action <code>wp_ajax_nopriv_install-imprint</code>.</li>
<li>The attacker sets the <code>option</code> parameter to <code>default_role</code> and the <code>opt_value</code> parameter to <code>administrator</code> within the POST request. This will change the default user role to administrator.</li>
<li>The attacker sets the <code>option</code> parameter to <code>users_can_register</code> and the <code>opt_value</code> parameter to <code>1</code> within the POST request. This enables user registration on the WordPress site.</li>
<li>The <code>ink_pd_add_option()</code> function executes, calling <code>delete_option()</code> and <code>add_option()</code> with the attacker-supplied values, effectively updating the WordPress options table.</li>
<li>The attacker registers a new user account on the WordPress site.</li>
<li>Because user registration is enabled and the default user role is set to administrator, the attacker&rsquo;s new account is granted administrator privileges, allowing full control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3596 allows unauthenticated attackers to gain complete control over a vulnerable WordPress website. This can lead to website defacement, data theft, malware distribution, and denial of service. Given the widespread use of WordPress, this vulnerability has the potential to affect a large number of websites across various sectors. A successful attack would result in the attacker having the same access as the original website administrator.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove the Riaxe Product Customizer plugin from WordPress installations if it is present. This will eliminate the attack vector (plugin removal).</li>
<li>Monitor web server logs (category: <code>webserver</code>, product: <code>linux</code> or <code>windows</code>) for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>install-imprint</code> using the Sigma rule provided below.</li>
<li>Consider implementing a Web Application Firewall (WAF) rule to block requests matching the exploit pattern described in the Attack Chain.</li>
<li>Review WordPress user accounts for any unauthorized administrators.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>cve-2026-3596</category><category>plugin</category></item><item><title>WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wcfm-sql-injection/</link><pubDate>Wed, 15 Apr 2026 17:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wcfm-sql-injection/</guid><description>An SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2025-63029 describes an SQL Injection vulnerability affecting the WC Lovers WCFM (WooCommerce Frontend Manager) Marketplace WordPress plugin. This vulnerability, present in versions up to and including 3.7.1, stems from improper neutralization of special elements within SQL commands. An attacker exploiting this flaw can inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion within the WordPress database. Given the widespread use of WordPress and the WCFM Marketplace plugin, this vulnerability poses a significant risk to e-commerce websites and their associated sensitive information. Successful exploitation could result in compromised customer data, financial losses, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WCFM Marketplace instance running a version &lt;= 3.7.1.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads in a vulnerable parameter.</li>
<li>The WCFM Marketplace plugin fails to properly sanitize the attacker-controlled input.</li>
<li>The unsanitized input is incorporated into an SQL query executed against the WordPress database.</li>
<li>The injected SQL code modifies the intended query logic.</li>
<li>The database server executes the attacker&rsquo;s malicious SQL query.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials, financial information, or product details.</li>
<li>The attacker may modify or delete data, escalate privileges, or potentially gain control of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-63029 can have severe consequences. An attacker could gain complete control over the affected WordPress site&rsquo;s database. This can lead to the theft of sensitive customer data (e.g., usernames, passwords, addresses, payment information), modification of product listings and pricing, or even complete site defacement or takeover. The number of potentially affected sites is substantial, considering the popularity of the WCFM Marketplace plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WC Lovers WCFM Marketplace plugin to the latest available version, which includes a patch for CVE-2025-63029.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WCFM Marketplace SQL Injection Attempts&rdquo; to your SIEM to identify potential exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious HTTP requests containing potential SQL injection payloads targeting the WCFM Marketplace plugin.</li>
<li>Review and harden database access controls to minimize the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>wcfm-marketplace</category></item><item><title>Smart Post Show WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</link><pubDate>Tue, 14 Apr 2026 06:17:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</guid><description>The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.</description><content:encoded><![CDATA[<p>The Smart Post Show WordPress plugin, specifically the Post Grid, Post Carousel &amp; Slider, and List Category Posts components, contains a PHP Object Injection vulnerability. This flaw affects all versions up to and including 3.0.12. The vulnerability resides in the <code>import_shortcodes()</code> function, where the deserialization of untrusted input occurs. This vulnerability requires an authenticated attacker with administrative privileges or higher. Successful exploitation requires the presence of a suitable Property-Oriented Programming (POP) chain within another installed plugin or theme. Without a POP chain, the injected object has no immediate impact. However, with a POP chain, attackers can potentially delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative-level access to the WordPress dashboard, either through credential compromise or vulnerability exploitation.</li>
<li>The attacker navigates to the Smart Post Show plugin settings page within the WordPress admin panel.</li>
<li>The attacker crafts a malicious payload containing a serialized PHP object designed to trigger a POP chain.</li>
<li>The attacker injects the malicious payload into the <code>import_shortcodes()</code> function, likely through a form field or file upload.</li>
<li>The <code>import_shortcodes()</code> function deserializes the attacker-controlled input, creating the malicious PHP object.</li>
<li>If a suitable POP chain exists within other installed plugins or themes, the deserialization triggers the chain.</li>
<li>The POP chain executes a series of predefined actions based on the objects and methods involved.</li>
<li>The final objective is achieved, such as deleting arbitrary files, retrieving sensitive data, or executing arbitrary code on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The PHP Object Injection vulnerability in the Smart Post Show WordPress plugin allows attackers to potentially gain remote code execution on the affected server. The impact is contingent on the existence of a POP chain within other installed plugins or themes. If successful, an attacker could potentially compromise the entire web server, leading to data breaches, defacement, or complete system takeover. Given the widespread use of WordPress and this plugin, a successful exploit could affect numerous websites across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Smart Post Show plugin to a version greater than 3.0.12 to patch CVE-2026-3017.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Plugin Deserialization Attempt&rdquo; to monitor for suspicious deserialization activity on WordPress servers.</li>
<li>Audit all installed WordPress plugins and themes for potential POP chains that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category></item><item><title>LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)</title><link>https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</link><pubDate>Tue, 14 Apr 2026 02:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</guid><description>The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.</description><content:encoded><![CDATA[<p>The LearnPress plugin for WordPress, in versions up to and including 4.3.2.8, is susceptible to unauthorized data deletion. The vulnerability stems from a missing capability check on the <code>delete_question_answer()</code> function. The plugin exposes a <code>wp_rest</code> nonce in public frontend HTML, and this nonce serves as the sole security check for the <code>lp-load-ajax</code> AJAX dispatcher. As the <code>delete_question_answer</code> action lacks capability or ownership validation, unauthenticated attackers can exploit this flaw to delete arbitrary quiz answer options. This is achieved by sending a crafted POST request containing a publicly available nonce. Exploitation does not require any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a LearnPress installation with a vulnerable version (&lt;= 4.3.2.8).</li>
<li>The attacker accesses the public frontend of the WordPress site.</li>
<li>The attacker retrieves the <code>wp_rest</code> nonce from the <code>lpData</code> variable in the HTML source code. This nonce is used for AJAX requests.</li>
<li>The attacker crafts a POST request to the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>action</code> parameter set to <code>delete_question_answer</code>.</li>
<li>The request also includes the <code>nonce</code> parameter with the value of the retrieved <code>wp_rest</code> nonce.</li>
<li>The request includes the <code>answer_id</code> parameter set to the ID of the quiz answer option to be deleted.</li>
<li>The server, lacking proper capability checks, processes the request and deletes the specified quiz answer option from the database. This results in data loss and potentially disrupts the functionality of quizzes within the LearnPress plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to arbitrarily delete quiz answer options within the LearnPress plugin. This can lead to data loss, disruption of quizzes, and potentially compromise the integrity of educational content. The CVSS v3.1 base score for this vulnerability is 9.1, indicating a critical severity. The number of victims and specific sectors targeted are currently unknown, but any website using the vulnerable LearnPress plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LearnPress plugin to a version greater than 4.3.2.8 to patch CVE-2026-4365.</li>
<li>Deploy the Sigma rule &ldquo;Detect LearnPress Unauthorized Data Deletion Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>delete_question_answer</code> and investigate suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>learnpress</category><category>data-deletion</category><category>unauthorized-access</category></item><item><title>Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-case-theme-lfi/</guid><description>CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.</description><content:encoded><![CDATA[<p>A local file inclusion (LFI) vulnerability, identified as CVE-2025-5804, affects the Case Theme User WordPress plugin before version 1.0.4. The vulnerability stems from insufficient validation of filenames passed to PHP&rsquo;s <code>include</code> or <code>require</code> statements. This allows an unauthenticated attacker to potentially include arbitrary local files on the server hosting the WordPress instance. Successful exploitation could lead to sensitive information disclosure, arbitrary code execution, or denial of service. The vulnerability was reported and patched by Patchstack. Users of the Case Theme User plugin are advised to upgrade to version 1.0.4 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Case Theme User plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting a PHP file within the plugin that uses an <code>include</code> or <code>require</code> statement.</li>
<li>The attacker modifies a GET or POST parameter associated with the vulnerable <code>include</code> or <code>require</code> statement, injecting a path to a local file (e.g., <code>/etc/passwd</code>).</li>
<li>The web server processes the request, and the PHP interpreter attempts to include the file specified in the attacker-controlled parameter.</li>
<li>Due to the LFI vulnerability, the server includes the attacker-specified local file.</li>
<li>If the included file contains sensitive data, such as configuration files or credentials, the attacker can extract this information from the server&rsquo;s response.</li>
<li>In more advanced scenarios, the attacker might attempt to include PHP files containing malicious code, achieving remote code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-5804 can lead to a range of impacts, including sensitive information disclosure such as WordPress configuration files (wp-config.php), which contain database credentials. Arbitrary code execution is possible if the attacker can include a file containing malicious PHP code. This could allow the attacker to gain complete control of the WordPress site and the underlying server. The number of affected sites depends on the adoption rate of the vulnerable Case Theme User plugin, but given the widespread use of WordPress, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Case Theme User WordPress plugin to version 1.0.4 or later to patch CVE-2025-5804.</li>
<li>Deploy the Sigma rule <code>Detect Case Theme User LFI Attempt</code> to your SIEM to identify potential exploitation attempts based on suspicious file paths in HTTP requests.</li>
<li>Monitor web server logs for unusual file access patterns, particularly requests containing &ldquo;..&rdquo;, &ldquo;%2e%2e&rdquo;, or other directory traversal sequences, to catch LFI attempts (see log source <code>webserver</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>php</category><category>lfi</category><category>wordpress</category><category>cve-2025-5804</category></item><item><title>CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)</title><link>https://feed.craftedsignal.io/briefs/2026-04-videopro-lfi/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-videopro-lfi/</guid><description>CVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.</description><content:encoded><![CDATA[<p>A local file inclusion (LFI) vulnerability has been identified in the CactusThemes VideoPro WordPress theme. Assigned CVE-2025-58913, this vulnerability exists due to the improper handling of filenames passed to include or require statements within the PHP code of the theme. Specifically, versions of VideoPro from its initial release up to and including version 2.3.8.1 are affected. Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to further compromise. The vulnerability was reported by Patchstack. Defenders should prioritize patching or removing the vulnerable theme.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a VideoPro installation running a vulnerable version (&lt;= 2.3.8.1).</li>
<li>The attacker crafts a malicious HTTP request targeting a PHP script within the VideoPro theme that uses <code>include</code> or <code>require</code> statements.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../../../../etc/passwd</code>) into the filename parameter of the HTTP request.</li>
<li>The vulnerable PHP script, without proper sanitization of the filename, attempts to include the attacker-specified file.</li>
<li>If successful, the contents of the file (e.g., <code>/etc/passwd</code>) are exposed within the web server&rsquo;s response.</li>
<li>The attacker analyzes the exposed file contents for sensitive information such as user credentials or configuration details.</li>
<li>The attacker uses the obtained information to further compromise the server or other related systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-58913 allows an attacker to read arbitrary files on the webserver hosting the vulnerable WordPress instance. This can lead to the exposure of sensitive data such as configuration files containing database credentials, WordPress salts, or even source code. If sensitive credentials are leaked, an attacker could pivot to other systems or gain administrative access to the WordPress site. The vulnerable VideoPro theme is used by an unknown number of WordPress websites, representing a significant attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the CactusThemes VideoPro theme to a patched version (later than 2.3.8.1) or remove the theme entirely from WordPress installations to remediate CVE-2025-58913.</li>
<li>Deploy the Sigma rule &ldquo;Detect VideoPro LFI Attempts via Path Traversal&rdquo; to identify exploitation attempts against vulnerable VideoPro installations using path traversal sequences in URI queries.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>../../</code>) in the URI query string, which may indicate LFI attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>lfi</category><category>cve-2025-58913</category></item><item><title>wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</link><pubDate>Sat, 11 Apr 2026 08:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</guid><description>The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.</description><content:encoded><![CDATA[<p>The wpForo Forum plugin, a popular WordPress plugin, is susceptible to an arbitrary file deletion vulnerability (CVE-2026-5809) affecting versions up to and including 3.0.2. The vulnerability stems from insufficient validation of user-supplied data within the <code>topic_add()</code> and <code>topic_edit()</code> action handlers. Specifically, the plugin improperly handles array values in the <code>$_REQUEST</code> data, storing them as postmeta without proper filtering. An authenticated attacker (subscriber-level or higher) can exploit this by injecting a malicious file path into the <code>data[body][fileurl]</code> parameter. This injected path is subsequently used in a file deletion function without adequate sanitization, leading to potential deletion of critical system files. This vulnerability allows attackers to potentially cripple the WordPress installation or gain further access to the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with at least subscriber-level privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>topic_add()</code> or <code>topic_edit()</code> action handler.</li>
<li>Within the request, the attacker includes the <code>data[body][fileurl]</code> parameter containing the path to the file they wish to delete (e.g., <code>/var/www/html/wp-config.php</code>).</li>
<li>The wpForo plugin stores the attacker-supplied <code>fileurl</code> value as postmeta associated with the forum topic without proper validation.</li>
<li>The attacker crafts another request, this time including the <code>wpftcf_delete[]=body</code> parameter, targeting the <code>topic_edit</code> action.</li>
<li>The <code>add_file()</code> method retrieves the poisoned <code>fileurl</code> from the stored postmeta record.</li>
<li>The plugin attempts to sanitize the path using <code>wpforo_fix_upload_dir()</code>, but this function only modifies paths within the legitimate wpForo upload directory, leaving other paths untouched.</li>
<li>The plugin calls <code>wp_delete_file()</code> on the unsanitized path, resulting in the deletion of the targeted file if the PHP process has write permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to delete arbitrary files on the server, provided the PHP process has the necessary write permissions. This can lead to a denial of service by deleting core WordPress files or configuration files such as <code>wp-config.php</code>. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high severity. This could lead to complete compromise of the WordPress installation and potential further exploitation of the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the wpForo Forum plugin to a version higher than 3.0.2 to patch CVE-2026-5809.</li>
<li>Deploy the Sigma rule &ldquo;Detect wpForo Arbitrary File Deletion Attempt&rdquo; to your SIEM to detect potential exploitation attempts by monitoring HTTP requests to WordPress.</li>
<li>Implement stricter file permission controls to limit the PHP process&rsquo;s write access to only necessary directories and files.</li>
<li>Monitor web server logs for suspicious POST requests containing the <code>wpftcf_delete</code> parameter, as highlighted in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>plugin</category><category>CVE-2026-5809</category></item><item><title>BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</link><pubDate>Sat, 11 Apr 2026 02:19:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</guid><description>The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.</description><content:encoded><![CDATA[<p>The BuddyPress Groupblog plugin, versions 1.9.3 and below, contains a critical privilege escalation vulnerability (CVE-2026-5144). This flaw allows authenticated attackers with minimal privileges (Subscriber or higher) to escalate privileges to Administrator on the main WordPress Multisite site. The vulnerability stems from a lack of authorization checks in the group blog settings handler. Specifically, the plugin improperly validates the <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> parameters. This vulnerability allows an attacker to associate their group with the main site (blog ID 1) and automatically assign the &lsquo;administrator&rsquo; role to new group members. Successful exploitation grants attackers full control over the WordPress Multisite network, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a new group on the WordPress Multisite network with a Subscriber account.</li>
<li>Attacker accesses the group&rsquo;s settings page.</li>
<li>Attacker modifies the <code>groupblog-blogid</code> parameter, setting it to &ldquo;1&rdquo; to associate the group with the main site. This is done by crafting a malicious HTTP POST request to the group settings handler.</li>
<li>The attacker modifies the <code>default-member</code> parameter to &ldquo;administrator&rdquo;. This parameter controls the default role assigned to new members.</li>
<li>The attacker enables the <code>groupblog-silent-add</code> parameter. This setting automatically adds new group members to the associated blog (main site) with the specified default role (administrator).</li>
<li>Attacker creates a second user account or convinces another user to join their malicious group.</li>
<li>When the new user joins the attacker&rsquo;s group, the <code>groupblog-silent-add</code> setting automatically adds the new user to the main site with the administrator role.</li>
<li>The attacker (via the new user account) now has administrator access to the main WordPress Multisite site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5144 grants an attacker complete control over the targeted WordPress Multisite network. This allows them to modify content, install malicious plugins, create new administrator accounts, and potentially compromise the underlying server. The impact is especially severe for organizations relying on WordPress Multisite for critical applications, as it can lead to data breaches, service disruptions, and significant financial losses. The vulnerability affects all installations using the BuddyPress Groupblog plugin up to version 1.9.3, potentially impacting thousands of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the BuddyPress Groupblog plugin to a version greater than 1.9.3 to patch CVE-2026-5144.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/options.php</code> with parameters <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> to detect potential exploitation attempts, using the provided Sigma rule.</li>
<li>Implement strict access control policies to limit the ability of low-privileged users to modify group settings and install plugins.</li>
<li>Enable logging of user role changes to detect unauthorized privilege escalation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>buddypress</category><category>privilege-escalation</category><category>cve-2026-5144</category><category>cloud</category></item><item><title>Zootemplate Cerato Theme Reflected XSS Vulnerability (CVE-2025-58920)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cerato-xss/</link><pubDate>Fri, 10 Apr 2026 14:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cerato-xss/</guid><description>A reflected cross-site scripting (XSS) vulnerability exists in the Zootemplate Cerato WordPress theme (versions n/a through 2.2.18) due to improper neutralization of user-supplied input, potentially allowing attackers to execute arbitrary JavaScript in a user's browser.</description><content:encoded><![CDATA[<p>A reflected XSS vulnerability, identified as CVE-2025-58920, affects the Zootemplate Cerato WordPress theme. The vulnerability resides in versions ranging from n/a through 2.2.18. It stems from the improper neutralization of input during web page generation, which can allow an attacker to inject malicious scripts into a web page viewed by other users. Successful exploitation could allow an attacker to steal cookies, redirect users to malicious websites, or deface web pages. Given the widespread use of WordPress and its themes, this vulnerability poses a risk to websites using the affected Cerato theme.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable endpoint within the Cerato theme that does not properly sanitize user input.</li>
<li>The attacker crafts a malicious URL containing a JavaScript payload within a parameter.</li>
<li>The attacker distributes the malicious URL via email, social media, or other means.</li>
<li>A victim clicks the malicious URL, sending a request to the vulnerable WordPress site.</li>
<li>The WordPress server, using the Cerato theme, reflects the attacker&rsquo;s JavaScript payload in the response without proper sanitization.</li>
<li>The victim&rsquo;s browser executes the malicious JavaScript code.</li>
<li>The attacker gains the ability to perform actions on behalf of the victim, such as stealing cookies or redirecting the user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reflected XSS vulnerability can lead to several adverse effects. An attacker could steal a user&rsquo;s session cookies, gaining unauthorized access to their account. Victims can be redirected to phishing sites, potentially compromising their credentials. Further, attackers might inject malicious content into the web page, defacing the site or spreading malware. The impact of this vulnerability is limited by the need for user interaction (clicking a malicious link), but the potential for widespread exploitation remains significant for sites using the vulnerable Cerato theme.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Zootemplate Cerato WordPress theme to a version beyond 2.2.18 to remediate CVE-2025-58920.</li>
<li>Deploy the Sigma rule to detect exploitation attempts against this vulnerability (see the &ldquo;Reflected XSS Attempt via GET&rdquo; rule below).</li>
<li>Implement a web application firewall (WAF) with rules to detect and block common XSS payloads to mitigate this and similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>reflected-xss</category></item><item><title>Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)</title><link>https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 10:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gravity-smtp-auth-bypass/</guid><description>The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.</description><content:encoded><![CDATA[<p>The Gravity SMTP plugin, a WordPress extension facilitating email sending through SMTP, contains a missing authorization vulnerability (CVE-2026-4162) affecting versions 2.1.4 and earlier. This flaw allows authenticated users with minimal subscriber-level permissions to perform administrative actions such as uninstalling and deactivating the plugin, as well as deleting its associated options. The vulnerability stems from the plugin failing to properly validate user authorization before executing sensitive functions. Additionally, the vulnerability can be exploited via a Cross-Site Request Forgery (CSRF) attack. Patches have been released in Gravity SMTP version 2.1.5 to address this security concern. Exploitation of this vulnerability allows low-privileged users to disrupt email functionality and potentially compromise WordPress configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with subscriber-level or higher privileges.</li>
<li>The attacker crafts a malicious HTTP request to uninstall the Gravity SMTP plugin, leveraging the missing authorization vulnerability. This request targets the WordPress plugin management endpoint.</li>
<li>Alternatively, the attacker crafts a CSRF attack that tricks a privileged user into triggering the malicious HTTP request to uninstall the plugin.</li>
<li>The WordPress server receives the crafted request without proper authorization checks.</li>
<li>The plugin&rsquo;s uninstall function is executed, removing the Gravity SMTP plugin from the WordPress installation.</li>
<li>The attacker crafts another HTTP request to delete Gravity SMTP plugin options.</li>
<li>The WordPress server processes the request, and the plugin options are deleted from the database.</li>
<li>The Gravity SMTP plugin is uninstalled and deactivated, and its settings are removed, disrupting the email functionality of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4162 allows attackers with low-level privileges on a WordPress site to disable email functionality and manipulate plugin settings. While the number of affected installations remains unknown, the impact can be significant for organizations heavily reliant on WordPress for communication or critical business processes, potentially leading to disruption of services, loss of email functionality, and unauthorized access to sensitive data or configurations. The CVSS v3.1 score of 7.1 indicates a high severity, considering the ease of exploitation and the potential for widespread disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity SMTP plugin to version 2.1.5 or later to patch CVE-2026-4162.</li>
<li>Monitor WordPress access logs for unauthorized requests targeting the plugin management endpoints to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect WordPress Plugin Uninstall via Missing Auth</code> to identify suspicious activity.</li>
<li>Implement CSRF protection mechanisms within WordPress plugins to mitigate the risk of CSRF-based exploitation.</li>
<li>Review WordPress user roles and permissions to minimize the attack surface and restrict access to sensitive functionalities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>missing-authorization</category><category>plugin</category><category>cve-2026-4162</category></item><item><title>Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</link><pubDate>Fri, 10 Apr 2026 02:37:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</guid><description>The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.</description><content:encoded><![CDATA[<p>The Perfmatters plugin for WordPress, in versions up to and including 2.5.9, is vulnerable to an arbitrary file overwrite vulnerability (CVE-2026-4351). This vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s processing of bulk <code>activate</code>/<code>deactivate</code> actions without proper authorization checks or nonce verification. The unsanitized <code>$_GET['snippets'][]</code> values are then passed to <code>Snippet::activate()</code>/<code>Snippet::deactivate()</code>, which subsequently call <code>Snippet::update()</code> and <code>file_put_contents()</code> with a traversed path. An authenticated attacker with subscriber-level privileges can exploit this flaw to overwrite arbitrary files on the server with a fixed PHP docblock, leading to a potential denial-of-service condition by corrupting critical files such as <code>.htaccess</code> or <code>index.php</code>. This vulnerability allows low-privileged users to gain elevated privileges on the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the WordPress site with subscriber-level access.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress installation.</li>
<li>The GET request includes the <code>pmcs_action</code> parameter set to <code>bulk_activate</code> or <code>bulk_deactivate</code>.</li>
<li>The GET request includes the <code>snippets[]</code> parameter containing a path traversal payload, such as <code>../../../.htaccess</code>.</li>
<li>The <code>PMCS::action_handler()</code> function processes the request without proper authorization or nonce validation.</li>
<li>The <code>Snippet::activate()</code> or <code>Snippet::deactivate()</code> functions are called, leading to <code>Snippet::update()</code>.</li>
<li><code>Snippet::update()</code> then calls <code>file_put_contents()</code> with the attacker-controlled path.</li>
<li>The attacker overwrites the targeted file (e.g., <code>.htaccess</code>, <code>index.php</code>) with a fixed PHP docblock, leading to a denial of service or further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to overwrite arbitrary files on the WordPress server. Overwriting critical files like <code>.htaccess</code> or <code>index.php</code> can result in a denial-of-service condition, rendering the website unavailable. In some cases, this could be leveraged for further compromise by injecting malicious code into other PHP files or modifying server configurations. The vulnerability affects all installations using the Perfmatters plugin version 2.5.9 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4351.</li>
<li>Deploy the Sigma rule <code>Detect Perfmatters Arbitrary File Overwrite Attempt</code> to monitor for exploitation attempts targeting this vulnerability via HTTP GET requests.</li>
<li>Monitor web server logs for suspicious GET requests containing <code>pmcs_action=bulk_activate</code> or <code>pmcs_action=bulk_deactivate</code> and path traversal sequences within the <code>snippets[]</code> parameter.</li>
<li>Implement strict file permission controls to limit the impact of potential file overwrite vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>perfmatters</category><category>file-overwrite</category><category>path-traversal</category></item><item><title>Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</link><pubDate>Thu, 09 Apr 2026 23:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</guid><description>Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.</description><content:encoded><![CDATA[<p>Smart Slider 3 Pro version 3.5.1.35, a popular WordPress and Joomla plugin, is vulnerable to remote code execution due to a compromised update system. This vulnerability, tracked as CVE-2026-34424, allows unauthenticated attackers to inject a multi-stage remote access toolkit. The attackers leverage this toolkit to execute arbitrary code and commands, effectively taking control of the affected web server. This vulnerability poses a significant threat to websites using the vulnerable plugin, potentially leading to data theft, website defacement, or use of the server for malicious purposes. Defenders should prioritize patching or removing the affected plugin version immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the Smart Slider 3 Pro update server.</li>
<li>A malicious update is pushed to vulnerable Smart Slider 3 Pro installations (version 3.5.1.35).</li>
<li>The plugin downloads and installs the malicious update, injecting the multi-stage remote access toolkit.</li>
<li>The attacker triggers pre-authentication remote shell execution by sending crafted HTTP headers to the web server.</li>
<li>An authenticated backdoor is established, allowing the attacker to execute arbitrary PHP code or OS commands.</li>
<li>The attacker creates hidden administrator accounts within WordPress or Joomla to maintain persistent access.</li>
<li>Credentials and access keys are exfiltrated from the compromised system.</li>
<li>Persistence is maintained through multiple injection points, including modifications to must-use plugins and core files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34424 leads to complete compromise of the affected web server. Attackers can gain unauthorized access to sensitive data, including user credentials, database information, and proprietary code. Websites can be defaced, injected with malware, or used as part of a botnet. The vulnerability affects all users of Smart Slider 3 Pro version 3.5.1.35, regardless of the underlying operating system. Given the widespread use of WordPress and Joomla, a large number of websites are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove or update Smart Slider 3 Pro to a patched version newer than 3.5.1.35 to remediate CVE-2026-34424.</li>
<li>Monitor web server logs for suspicious HTTP requests with unusual headers indicative of attempted pre-authentication shell execution as described in the Attack Chain.</li>
<li>Implement the provided Sigma rules to detect suspicious process creation and file modifications related to the injected toolkit.</li>
<li>Audit user accounts for unauthorized administrator accounts as the attacker creates hidden accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>joomla</category><category>remote-code-execution</category><category>plugin</category></item><item><title>WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)</title><link>https://feed.craftedsignal.io/briefs/2026-04-adivaha-sql-injection/</link><pubDate>Thu, 09 Apr 2026 21:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-adivaha-sql-injection/</guid><description>The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.</description><content:encoded><![CDATA[<p>The adivaha Travel plugin 2.3 for WordPress is susceptible to a time-based blind SQL injection vulnerability (CVE-2023-54359). This flaw allows unauthenticated attackers to inject malicious SQL code through the &lsquo;pid&rsquo; GET parameter in requests to the <code>/mobile-app/v3/</code> endpoint. By crafting specific &lsquo;pid&rsquo; values with XOR-based payloads, attackers can manipulate database queries. This vulnerability can be exploited to extract sensitive database information or to cause a denial-of-service condition on the affected WordPress site. Publicly available exploits exist, increasing the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable adivaha Travel Plugin version 2.3.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/mobile-app/v3/</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>pid</code> GET parameter, utilizing XOR-based payloads to bypass input validation or sanitization.</li>
<li>The server processes the malicious SQL query against the WordPress database.</li>
<li>Due to the time-based blind SQL injection, the attacker infers information about the database by observing the response time of the server.</li>
<li>Through repeated requests, the attacker extracts sensitive data from the database, such as user credentials, API keys, or other confidential information.</li>
<li>Alternatively, the attacker injects SQL code to cause a denial-of-service condition, such as by creating a very long delay.</li>
<li>The attacker uses the exfiltrated data for malicious purposes or further compromise of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the extraction of sensitive information from the WordPress database, potentially compromising user accounts, customer data, and other confidential information. Attackers could gain complete control over the affected website, leading to defacement, malware distribution, or further attacks on other systems. A successful denial-of-service attack could also disrupt the availability of the website, impacting business operations and user experience.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for the adivaha Travel Plugin to remediate CVE-2023-54359.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious adivaha Travel Plugin SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts targeting the <code>/mobile-app/v3/</code> endpoint.</li>
<li>Inspect web server logs for requests to <code>/mobile-app/v3/</code> containing suspicious characters or SQL syntax in the <code>pid</code> parameter to identify exploitation attempts (reference: vulnerable endpoint <code>/mobile-app/v3/</code>).</li>
<li>Monitor network traffic for connections to the URLs listed in the IOCs (reference: <code>https://www.exploit-db.com/exploits/51655</code> and <code>https://www.vulncheck.com/advisories/wordpress-adivaha-travel-plugin-sql-injection-via-pid</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>wordpress</category><category>sql-injection</category><category>cve-2023-54359</category></item><item><title>WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)</title><link>https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</link><pubDate>Wed, 08 Apr 2026 12:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</guid><description>The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.</description><content:encoded><![CDATA[<p>The WooCommerce Ajax Product Filter (WCAPF) plugin, a WordPress extension, is susceptible to a time-based SQL Injection vulnerability (CVE-2026-3396). This flaw stems from inadequate input sanitization of the <code>post-author</code> parameter and insufficient preparation within the existing SQL query structure. Specifically, all versions of the plugin up to and including version 4.2.3 are affected. An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code into the <code>post-author</code> parameter. Successful exploitation allows the attacker to manipulate database queries and extract sensitive information without requiring authentication. This vulnerability poses a significant risk to e-commerce sites using the WCAPF plugin, as attackers could potentially access customer data, administrative credentials, or other confidential information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WooCommerce website using a vulnerable version (&lt;=4.2.3) of the WCAPF plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the vulnerable <code>post-author</code> parameter.</li>
<li>The crafted request includes SQL injection payload within the <code>post-author</code> parameter, designed to extract data using time-based techniques. For example, the attacker might use a <code>SLEEP()</code> function to introduce delays based on conditional database queries.</li>
<li>The web server processes the request and passes the unsanitized <code>post-author</code> parameter to the database query.</li>
<li>The injected SQL code manipulates the original query, causing the database to execute the attacker&rsquo;s malicious commands.</li>
<li>Based on the response time (due to the <code>SLEEP()</code> function), the attacker infers whether their injected SQL query was successful in retrieving specific data.</li>
<li>The attacker iteratively refines their SQL injection payload to extract sensitive information, such as user credentials or customer details.</li>
<li>The attacker exfiltrates the obtained data, potentially using it for identity theft, financial fraud, or further attacks against the compromised website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3396 can lead to the complete compromise of the vulnerable WooCommerce website&rsquo;s database. An attacker could potentially access sensitive customer data, including names, addresses, credit card details, and purchase history. Furthermore, administrative credentials could be stolen, allowing the attacker to gain full control over the website. This can result in significant financial losses, reputational damage, and legal liabilities for the affected e-commerce business. While the exact number of affected websites is unknown, any online store using the WCAPF plugin versions 4.2.3 or earlier is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WCAPF plugin to a version greater than 4.2.3 to patch CVE-2026-3396 (references: CVE-2026-3396).</li>
<li>Deploy the Sigma rule <code>Detect WooCommerce SQL Injection Attempt</code> to identify potential exploitation attempts in web server logs (references: Sigma rule).</li>
<li>Implement input validation and sanitization on the <code>post-author</code> parameter to prevent SQL injection attacks (references: Attack Chain).</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads, particularly those targeting WCAPF plugin endpoints (references: Sigma rule, Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>woocommerce</category><category>sqli</category><category>cve-2026-3396</category><category>wordpress</category><category>plugin</category></item><item><title>WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</link><pubDate>Wed, 08 Apr 2026 07:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-upload/</guid><description>The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Gerador de Certificados – DevApps plugin for WordPress, versions up to and including 1.3.6, contains an arbitrary file upload vulnerability (CVE-2026-4808). This flaw stems from a lack of file type validation within the <code>moveUploadedFile()</code> function. Authenticated users with administrator privileges or higher can exploit this vulnerability by uploading arbitrary files to the affected server. Successful exploitation could allow an attacker to execute arbitrary code on the server, leading to a complete system compromise. This vulnerability poses a significant threat to websites using the affected plugin, potentially impacting data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with administrator-level privileges.</li>
<li>The attacker navigates to the Gerador de Certificados – DevApps plugin&rsquo;s upload functionality.</li>
<li>The attacker crafts a malicious file (e.g., a PHP file) with a disguised extension or no extension.</li>
<li>The attacker uploads the malicious file through the plugin&rsquo;s interface, bypassing the missing file type validation in the <code>moveUploadedFile()</code> function.</li>
<li>The plugin saves the file to a publicly accessible directory on the server.</li>
<li>The attacker identifies the location of the uploaded file.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location.</li>
<li>The server executes the malicious code within the uploaded file, granting the attacker remote code execution capabilities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers with administrator privileges to upload arbitrary files to the web server. This can lead to remote code execution, potentially allowing the attacker to gain full control of the WordPress website and the underlying server. This could lead to data theft, website defacement, or use of the server for malicious purposes such as hosting phishing sites or launching attacks against other systems. The number of affected sites is potentially very large.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gerador de Certificados – DevApps plugin to the latest version, which includes a fix for CVE-2026-4808.</li>
<li>Implement web server configurations to prevent the execution of scripts in upload directories.</li>
<li>Enable web server logging and monitor for suspicious file uploads and access attempts to unusual file types.</li>
<li>Deploy the Sigma rule to detect attempts to access PHP files within the wp-content/uploads directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>remote-code-execution</category></item><item><title>Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)</title><link>https://feed.craftedsignal.io/briefs/2026-04-woocommerce-csrf/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-woocommerce-csrf/</guid><description>The Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.</description><content:encoded><![CDATA[<p>The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin, a WordPress plugin, suffers from a Cross-Site Request Forgery (CSRF) vulnerability. Present in versions 13.4.6 through 13.5.2.1, this flaw allows unauthenticated attackers to execute administrative functions if they can successfully coerce a site administrator into performing an action, such as clicking a specially crafted link. The vulnerability stems from the plugin&rsquo;s failure to implement proper nonce validation on several AJAX actions, including <code>ajax_migrate_to_custom_post_type</code>, <code>ajax_adt_clear_custom_attributes_product_meta_keys</code>, <code>ajax_update_file_url_to_lower_case</code>, <code>ajax_use_legacy_filters_and_rules</code>, and <code>ajax_fix_duplicate_feed</code>. This vulnerability poses a significant risk to WooCommerce store owners using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL containing a request to one of the vulnerable AJAX actions (e.g., <code>ajax_migrate_to_custom_post_type</code>).</li>
<li>The attacker distributes the malicious URL via email, social media, or another channel, attempting to trick a WordPress administrator into clicking the link.</li>
<li>The administrator, while authenticated to the WordPress admin panel, clicks the malicious link.</li>
<li>The administrator&rsquo;s browser sends the forged request to the WordPress server, including the administrator&rsquo;s session cookies.</li>
<li>Due to the missing or incorrect nonce validation, the WordPress server processes the request as if it were a legitimate action performed by the administrator.</li>
<li>Depending on the specific AJAX action targeted, the attacker can trigger feed migration, clear custom attribute caches, rewrite feed file URLs to lowercase, toggle legacy filter and rule settings, or delete duplicate feed posts.</li>
<li>The attacker repeats this process to perform other administrative actions, gaining control over the plugin&rsquo;s settings and data.</li>
<li>The attacker potentially manipulates product feeds to inject malicious content, redirect users, or compromise the WooCommerce store&rsquo;s SEO.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability (CVE-2026-3499) could allow an attacker to manipulate a WooCommerce store&rsquo;s product feeds, potentially leading to data corruption, SEO poisoning, or the injection of malicious content. If successful, attackers could modify product information, redirect users to phishing sites, or damage the store&rsquo;s reputation. The severity of the impact depends on the targeted AJAX action, but the potential for unauthorized administrative control is significant. Given the wide usage of WooCommerce and the Product Feed PRO plugin, a large number of online stores are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Product Feed PRO for WooCommerce plugin to a patched version greater than 13.5.2.1 to remediate CVE-2026-3499.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect exploitation attempts targeting the vulnerable AJAX actions.</li>
<li>Implement web application firewall (WAF) rules to block requests to the vulnerable AJAX endpoints originating from suspicious referrers.</li>
<li>Educate WordPress administrators on the risks of CSRF attacks and the importance of verifying links before clicking them.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>woocommerce</category><category>csrf</category><category>cve-2026-3499</category></item><item><title>Everest Forms WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the <code>html-admin-page-entries-view.php</code> file. Specifically, the plugin uses PHP&rsquo;s <code>unserialize()</code> function on form entry metadata stored in the <code>wp_evf_entrymeta</code> table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The <code>sanitize_text_field()</code> function fails to prevent these attacks because it doesn&rsquo;t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.</li>
<li>The submitted payload bypasses the <code>sanitize_text_field()</code> function due to the function&rsquo;s failure to remove serialization control characters.</li>
<li>The crafted serialized object is stored in the <code>wp_evf_entrymeta</code> database table associated with the form entry.</li>
<li>An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.</li>
<li>The <code>html-admin-page-entries-view.php</code> file is executed to display form entries and their associated metadata.</li>
<li>The plugin retrieves the stored serialized object from the <code>wp_evf_entrymeta</code> table.</li>
<li>The <code>unserialize()</code> function is called on the retrieved data <em>without</em> the <code>allowed_classes</code> parameter, triggering PHP Object Injection.</li>
<li>The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious unserialize Call in Everest Forms</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the <code>Detect Suspicious Form Submission with Serialized Data</code> Sigma rule.</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category><category>cve-2026-3296</category></item><item><title>CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-csrf/</link><pubDate>Tue, 07 Apr 2026 09:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-csrf/</guid><description>A cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.</description><content:encoded><![CDATA[<p>A cross-site request forgery (CSRF) vulnerability, identified as CVE-2026-34896, affects the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin. This vulnerability allows an attacker to trick a user into performing actions they did not intend to, such as modifying plugin settings or performing administrative tasks, provided the targeted user is authenticated to the WordPress site. The vulnerability exists in versions from n/a through 2.1.1. The vulnerability was reported to affect a publicly available plugin, increasing the scope of potentially impacted websites. Successful exploitation could lead to arbitrary code execution depending on the privileges of the targeted user and plugin functionality that can be abused.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable WordPress site running the affected plugin.</li>
<li>The attacker crafts a malicious HTML page containing a CSRF exploit. This page contains a crafted HTTP request designed to trigger a specific action within the plugin (e.g., changing settings) when submitted by an authenticated user.</li>
<li>The attacker distributes the malicious HTML page via email, social media, or other means to a targeted WordPress administrator or user.</li>
<li>The targeted user, while logged into the vulnerable WordPress site, visits the malicious HTML page.</li>
<li>The user&rsquo;s browser automatically submits the crafted HTTP request to the WordPress site without the user&rsquo;s knowledge or consent.</li>
<li>The WordPress site, believing the request originated from the authenticated user, processes the request and executes the attacker&rsquo;s desired action.</li>
<li>The attacker&rsquo;s malicious action, such as changing plugin settings, is successfully performed on the vulnerable WordPress site.</li>
<li>Depending on the privileges of the compromised user and vulnerable plugin settings, the attacker may be able to achieve arbitrary code execution, site defacement, or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability (CVE-2026-34896) in the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin could lead to unauthorized modification of website settings, potentially resulting in site defacement, malware injection, or complete website takeover. The impact depends on the targeted user&rsquo;s privileges and the plugin&rsquo;s configurable options. While the exact number of affected websites is unknown, the plugin&rsquo;s popularity suggests a potentially broad impact across various sectors using WordPress for their online presence.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Analytify Under Construction, Coming Soon &amp; Maintenance Mode WordPress plugin to a version beyond 2.1.1 to patch CVE-2026-34896.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Plugin Setting Changes via POST</code> to monitor for unauthorized changes to WordPress plugins.</li>
<li>Educate WordPress users on the risks of CSRF attacks and the importance of verifying the legitimacy of links and websites before clicking them.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>csrf</category><category>vulnerability</category></item><item><title>Amelia WordPress Plugin IDOR Vulnerability CVE-2026-5465</title><link>https://feed.craftedsignal.io/briefs/2026-04-amelia-idor/</link><pubDate>Tue, 07 Apr 2026 07:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-amelia-idor/</guid><description>The Amelia WordPress plugin is vulnerable to an insecure direct object reference, allowing authenticated attackers with Provider-level access or higher to escalate privileges and gain persistence by taking over any WordPress account, including Administrator by manipulating the `externalId` field.</description><content:encoded><![CDATA[<p>The Amelia WordPress plugin, specifically the &ldquo;Booking for Appointments and Events Calendar&rdquo;, contains an Insecure Direct Object Reference (IDOR) vulnerability (CVE-2026-5465) in versions up to and including 2.1.3. This flaw resides within the <code>UpdateProviderCommandHandler</code> and stems from insufficient validation when a Provider (Employee) user modifies their profile. The critical issue is the ability to manipulate the <code>externalId</code> field, which directly corresponds to a WordPress user ID. By injecting an arbitrary <code>externalId</code> value during a profile update, an authenticated attacker with Provider-level access or higher can bypass authorization checks. This oversight permits the attacker to execute functions such as <code>wp_set_password()</code> and <code>wp_update_user()</code> on behalf of any other user, including those with Administrator privileges. This vulnerability allows for complete account takeover, representing a significant risk for organizations utilizing the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress instance with the Amelia plugin installed, possessing at least Provider (Employee) level privileges.</li>
<li>The attacker navigates to their user profile within the Amelia plugin interface.</li>
<li>The attacker intercepts the HTTP request generated when updating their profile using a tool like Burp Suite or browser developer tools.</li>
<li>The attacker modifies the <code>externalId</code> parameter within the intercepted HTTP request, replacing its original value with the WordPress user ID of the target account they wish to compromise (e.g., the Administrator account, typically user ID 1).</li>
<li>The attacker sends the modified HTTP request to the server.</li>
<li>Due to the IDOR vulnerability, the <code>UpdateProviderCommandHandler</code> fails to validate the manipulated <code>externalId</code> value.</li>
<li>The Amelia plugin&rsquo;s backend utilizes the attacker-controlled <code>externalId</code> to call <code>wp_set_password()</code> and/or <code>wp_update_user()</code> on the target account.</li>
<li>The attacker successfully changes the password or other profile details of the target account, achieving complete account takeover and escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5465 allows an attacker with minimal privileges (Provider/Employee role) to compromise any other account on the WordPress instance, including Administrator accounts. This grants the attacker full control over the WordPress site, enabling them to install malicious plugins, modify content, exfiltrate sensitive data, or further compromise the underlying server. The number of potential victims is directly proportional to the number of websites utilizing the vulnerable Amelia plugin. Given the plugin&rsquo;s popularity, a successful mass exploitation could impact thousands of websites across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Amelia WordPress plugin to the latest version (greater than 2.1.3) to patch CVE-2026-5465.</li>
<li>Monitor web server logs for POST requests to the <code>/wp-admin/admin-ajax.php</code> endpoint with the <code>action</code> parameter set to <code>am_update_provider</code> and a modified <code>externalId</code> parameter in the request body. Implement the Sigma rule <code>Detect Amelia Plugin IDOR Attack</code> to detect such activity.</li>
<li>Implement strong password policies and multi-factor authentication for all WordPress accounts, including those with limited privileges, to mitigate the impact of potential account compromises.</li>
<li>Review and audit existing WordPress user accounts and their assigned roles to identify and remove any unnecessary or excessive privileges.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>amelia</category><category>idor</category><category>privilege-escalation</category></item><item><title>Ninja Forms File Upload Plugin Vulnerability Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</link><pubDate>Tue, 07 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ninja-forms-rce/</guid><description>The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Ninja Forms - File Uploads plugin for WordPress, specifically versions up to and including 3.3.26, contains an arbitrary file upload vulnerability (CVE-2026-0740). This flaw stems from a lack of proper file type validation within the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress server. Successful exploitation could enable remote code execution, allowing the attacker to compromise the web server and potentially the underlying network. The vulnerability was partially addressed in version 3.3.25 and fully resolved in version 3.3.27. This vulnerability poses a significant risk to organizations using the vulnerable plugin, potentially leading to data breaches, website defacement, or complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the WordPress server targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The POST request includes a malicious file disguised as a legitimate file type, exploiting the missing file type validation in the <code>NF_FU_AJAX_Controllers_Uploads::handle_upload</code> function.</li>
<li>The <code>handle_upload</code> function processes the request without properly validating the file type, allowing the malicious file to be uploaded to the server.</li>
<li>The uploaded file is stored in the WordPress uploads directory, typically located within the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>The attacker crafts the malicious file (e.g., a PHP script) to execute arbitrary code on the server when accessed.</li>
<li>The attacker accesses the uploaded malicious file via a direct HTTP request to the file&rsquo;s location within the uploads directory.</li>
<li>The web server executes the malicious file (e.g., a PHP script), granting the attacker the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the executed code to gain a persistent foothold on the server, install malware, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0740 allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution. This can result in complete compromise of the WordPress website, including data breaches, website defacement, and installation of backdoors. The impact is significant due to the widespread use of WordPress and the Ninja Forms plugin. Even a single successful attack can lead to substantial financial losses, reputational damage, and legal liabilities. Websites utilizing versions of the Ninja Forms File Uploads plugin prior to 3.3.27 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Ninja Forms File Uploads plugin to version 3.3.27 or later to fully patch CVE-2026-0740.</li>
<li>Implement web application firewall (WAF) rules to detect and block malicious file upload attempts targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>Monitor web server access logs for suspicious requests to the <code>wp-content/uploads/ninja-forms-uploads/</code> directory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Ninja Forms Arbitrary File Upload Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enforce strict file type validation on all file upload forms, even after upgrading the plugin, as a defense-in-depth measure.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>CVE-2026-0740</category></item><item><title>Media Library Assistant WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mla-sql-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mla-sql-injection/</guid><description>The Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.</description><content:encoded><![CDATA[<p>CVE-2026-34885 describes an SQL Injection vulnerability affecting the Media Library Assistant WordPress plugin. This plugin, developed by David Lingren, is vulnerable in versions up to and including 3.34. The vulnerability stems from improper neutralization of special elements used in SQL commands, potentially allowing attackers to inject malicious SQL code. Exploitation could lead to unauthorized data access, modification, or deletion within the WordPress database. Given the widespread use of WordPress and its plugin ecosystem, this vulnerability presents a significant risk to websites utilizing the affected plugin. Successful exploitation could compromise sensitive information, deface websites, or even gain administrative control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a WordPress website using Media Library Assistant version 3.34 or earlier.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payload in a plugin parameter, such as a search query or media metadata field.</li>
<li>The crafted request is sent to the vulnerable endpoint within the Media Library Assistant plugin.</li>
<li>The plugin fails to properly sanitize or neutralize the SQL injection payload.</li>
<li>The unsanitized payload is incorporated into an SQL query executed against the WordPress database.</li>
<li>The injected SQL code manipulates the query logic, allowing the attacker to bypass security checks.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials, posts, or other stored information.</li>
<li>The attacker could potentially modify or delete data, or even gain administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a range of damaging outcomes. Attackers could gain unauthorized access to sensitive data stored within the WordPress database, including user credentials, customer information, and proprietary content. This data could be exfiltrated and sold on the dark web or used for further malicious activities. Website defacement, data modification, and complete site compromise are also potential consequences. The number of affected websites is potentially large, given the popularity of WordPress and its extensive plugin ecosystem.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Media Library Assistant WordPress plugin to a version higher than 3.34 to patch CVE-2026-34885.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts via HTTP Request</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attacks against WordPress plugins.</li>
<li>Enable regular security audits of WordPress installations and plugins to identify and address vulnerabilities promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin-vulnerability</category></item><item><title>WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</guid><description>The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.</description><content:encoded><![CDATA[<p>The Widgets for Social Photo Feed plugin for WordPress, versions up to and including 1.7.9, contains a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5425). This vulnerability stems from insufficient input sanitization and output escaping of the &lsquo;feed_data&rsquo; parameter keys. An unauthenticated attacker can exploit this flaw by injecting malicious JavaScript code into the WordPress database. When a user visits a page containing a vulnerable widget, the injected script executes within their browser, potentially leading to session hijacking, account takeover, or other malicious activities. This vulnerability was reported by Wordfence and patched in version 1.8 of the plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;= 1.7.9) of the Widgets for Social Photo Feed plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting the plugin&rsquo;s functionality that handles the <code>feed_data</code> parameter. This request contains XSS payload within the parameter keys.</li>
<li>The WordPress server receives the crafted HTTP request. The vulnerable plugin processes the request without proper input sanitization or output escaping.</li>
<li>The malicious XSS payload is stored in the WordPress database, associated with the plugin&rsquo;s settings or data.</li>
<li>A legitimate user visits a page on the WordPress site where the affected widget is displayed.</li>
<li>The WordPress server retrieves the plugin data, including the stored XSS payload, from the database.</li>
<li>The server renders the page with the unsanitized XSS payload embedded within the HTML output.</li>
<li>The user&rsquo;s browser receives the HTML page containing the malicious script and executes it. This could lead to redirection, information theft, or further compromise of the user&rsquo;s session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a website user&rsquo;s browser. This can result in session hijacking, defacement of the website, redirection to malicious sites, or the theft of sensitive information. While the exact number of vulnerable installations is not available, the widespread use of WordPress plugins makes this a potentially significant threat, particularly for sites that do not promptly apply security updates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Widgets for Social Photo Feed plugin to version 1.8 or later to patch CVE-2026-5425.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Social Photo Feed XSS Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement a web application firewall (WAF) rule to filter out requests containing potentially malicious JavaScript code in the <code>feed_data</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-5425</category><category>plugin</category></item><item><title>ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-profilepress-bypass/</guid><description>The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.</description><content:encoded><![CDATA[<p>The ProfilePress plugin for WordPress, specifically the &ldquo;Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile &amp; Restrict Content&rdquo; version 4.16.11 and earlier, contains a vulnerability (CVE-2026-3445) that allows authenticated attackers to bypass membership payment requirements. This flaw stems from a missing ownership verification on the <code>change_plan_sub_id</code> parameter within the <code>process_checkout()</code> function. An attacker with subscriber-level access can exploit this by referencing another user&rsquo;s active subscription during the checkout process. This manipulation affects proration calculations, ultimately enabling the attacker to obtain paid lifetime membership plans without submitting legitimate payment. This vulnerability is triggered via the <code>ppress_process_checkout</code> AJAX action, making it critical for defenders to implement appropriate detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers a new account on the WordPress site with the vulnerable ProfilePress plugin installed, obtaining subscriber-level access.</li>
<li>The attacker identifies a valid, active subscription ID belonging to another user within the ProfilePress system.</li>
<li>The attacker initiates the purchase of a paid membership plan (e.g., a lifetime membership).</li>
<li>During the checkout process, the attacker intercepts the HTTP request sent to the <code>ppress_process_checkout</code> AJAX action.</li>
<li>The attacker modifies the <code>change_plan_sub_id</code> parameter within the request, replacing the expected value with the subscription ID of the other user.</li>
<li>The server-side <code>process_checkout()</code> function fails to properly validate the ownership of the provided <code>change_plan_sub_id</code>.</li>
<li>Due to the manipulated <code>change_plan_sub_id</code>, the proration calculations are skewed, resulting in a significantly reduced or zeroed payment amount.</li>
<li>The attacker completes the checkout process without making a legitimate payment and is granted access to the paid membership plan.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3445 allows attackers to bypass payment requirements and gain unauthorized access to premium content and features offered through the ProfilePress plugin. This can result in significant revenue loss for website owners relying on paid memberships. The number of affected websites is potentially large, given the popularity of WordPress and the ProfilePress plugin. This vulnerability could also damage the reputation of the affected website and erode trust among legitimate paying members.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ProfilePress version 4.16.12 or later to patch CVE-2026-3445 (reference: vulnerability description).</li>
<li>Deploy the Sigma rule <code>Detect ProfilePress Membership Bypass Attempt</code> to your SIEM and tune for your environment to detect potential exploitation attempts by monitoring for the use of the <code>ppress_process_checkout</code> AJAX action with suspicious <code>change_plan_sub_id</code> values (reference: Sigma rule).</li>
<li>Monitor web server logs for POST requests to the <code>/wp-admin/admin-ajax.php</code> endpoint with the <code>action</code> parameter set to <code>ppress_process_checkout</code> to identify potential exploit attempts (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>vulnerability</category><category>membership</category></item><item><title>Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</link><pubDate>Fri, 03 Apr 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</guid><description>The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.</description><content:encoded><![CDATA[<p>The Perfmatters plugin, a popular WordPress performance optimization tool, contains a critical vulnerability (CVE-2026-4350) affecting versions up to and including 2.5.9.1. This flaw enables authenticated attackers with Subscriber-level access, the lowest privilege level in WordPress, to delete arbitrary files on the server. The vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s failure to sanitize the <code>$_GET['delete']</code> parameter. This lack of validation allows for path traversal attacks using sequences like <code>../</code>, enabling attackers to navigate outside the intended storage directory and delete any accessible file. Successful exploitation can lead to the deletion of critical files such as <code>wp-config.php</code>, effectively disabling the website and potentially allowing a full site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using a vulnerable version (&lt;=2.5.9.1) of the Perfmatters plugin.</li>
<li>Attacker gains Subscriber-level access to the WordPress site. This can be achieved through registration or compromised credentials.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress site. The request includes the <code>delete</code> parameter with a path traversal payload. For example: <code>?delete=../../../../wp-config.php</code>.</li>
<li>The request is sent to the <code>PMCS::action_handler()</code> method within the Perfmatters plugin.</li>
<li>The <code>PMCS::action_handler()</code> method processes the unsanitized <code>$_GET['delete']</code> parameter.</li>
<li>The plugin concatenates the malicious path with the storage directory.</li>
<li>The <code>unlink()</code> function executes, deleting the file specified by the attacker&rsquo;s path traversal payload.</li>
<li>If the attacker successfully deletes <code>wp-config.php</code>, the WordPress site becomes inaccessible and redirects to the installation wizard, potentially allowing for complete site takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4350 allows attackers to delete arbitrary files on a vulnerable WordPress server. A key target is <code>wp-config.php</code>, which contains sensitive database credentials. Deleting this file forces WordPress into the installation wizard, potentially leading to a full site takeover. The impact ranges from defacement and data loss to complete control of the website, impacting businesses, organizations, and individuals relying on WordPress for their online presence. The ease of exploitation due to the low privilege requirements makes this a high-risk vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4350.</li>
<li>Implement the provided Sigma rule <code>Detect Perfmatters Arbitrary File Deletion Attempt</code> to identify potential exploitation attempts based on <code>cs-uri-query</code> in web server logs.</li>
<li>Consider implementing rate limiting on requests to <code>wp-admin/options.php</code> to mitigate potential brute-force exploitation attempts targeting this vulnerability.</li>
<li>Review web server access logs for unusual patterns in <code>cs-uri-query</code> parameters containing <code>../</code> sequences, as these may indicate path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4350</category><category>wordpress</category><category>perfmatters</category><category>file-deletion</category><category>path-traversal</category></item><item><title>WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-webmention-ssrf/</link><pubDate>Thu, 02 Apr 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-webmention-ssrf/</guid><description>The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.</description><content:encoded><![CDATA[<p>The Webmention plugin for WordPress, a plugin designed to facilitate webmention communications, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-0686. This vulnerability affects all versions of the plugin up to and including 5.6.2. The vulnerability resides within the &lsquo;MF2::parse_authorpage&rsquo; function, accessible through the &lsquo;Receiver::post&rsquo; function. An unauthenticated attacker can exploit this flaw to force the WordPress server to make HTTP requests to arbitrary external or internal locations. This can be leveraged to gather sensitive information from internal services, bypass firewalls, or potentially modify data depending on the accessibility of internal resources. The vulnerable code was present as of April 2026 in the version 5.6.2 branch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious webmention request targeting a WordPress site running the vulnerable Webmention plugin.</li>
<li>The WordPress site receives the webmention request and processes it using the &lsquo;Receiver::post&rsquo; function.</li>
<li>The &lsquo;Receiver::post&rsquo; function calls the &lsquo;MF2::parse_authorpage&rsquo; function to parse the author page URL specified in the webmention request.</li>
<li>The &lsquo;MF2::parse_authorpage&rsquo; function, due to lack of proper validation, makes an HTTP request to an attacker-controlled or internal URL specified within the webmention data.</li>
<li>The WordPress server initiates a connection to the specified URL, potentially bypassing firewall restrictions or accessing internal services not directly exposed to the internet.</li>
<li>The response from the targeted URL is processed by the plugin, potentially revealing information about the internal network or services.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify data or execute commands.</li>
<li>Successful exploitation leads to information disclosure, internal service compromise, or potential remote code execution depending on the vulnerable internal service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0686 allows unauthenticated attackers to perform Server-Side Request Forgery attacks against WordPress sites utilizing the Webmention plugin. This can lead to the exposure of sensitive information from internal services, such as configuration files or database credentials. Furthermore, attackers could potentially leverage this vulnerability to interact with and potentially compromise other internal systems that are not directly accessible from the internet, leading to a full compromise of the affected network. While the exact number of affected WordPress installations is unknown, the widespread use of the Webmention plugin makes this a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Webmention plugin to a version higher than 5.6.2 to patch CVE-2026-0686.</li>
<li>Deploy the Sigma rule &ldquo;Detect Webmention SSRF Attempt via Request to Internal IP&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual outbound connections originating from the WordPress server to internal IP addresses.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks, restricting access from the WordPress server to only necessary internal services.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wordpress</category><category>webmention</category><category>cve-2026-0686</category></item><item><title>MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)</title><link>https://feed.craftedsignal.io/briefs/2026-04-mw-wp-form-file-move/</link><pubDate>Thu, 02 Apr 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mw-wp-form-file-move/</guid><description>The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The MW WP Form plugin for WordPress is susceptible to an arbitrary file moving vulnerability identified as CVE-2026-4347. This flaw stems from a lack of proper file path validation within the &lsquo;generate_user_filepath&rsquo; and &lsquo;move_temp_file_to_upload_dir&rsquo; functions. All versions of the plugin up to and including 5.1.0 are affected. An unauthenticated attacker can exploit this vulnerability to move arbitrary files on the server, potentially overwriting or relocating critical system files. The most severe outcome is remote code execution, which can be achieved by moving files such as &lsquo;wp-config.php&rsquo; to a location where its contents are exposed. The vulnerability is only exploitable when a file upload field exists on a form and the “Saving inquiry data in database” option is enabled, narrowing the attack surface but increasing the risk for affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the MW WP Form plugin (&lt;= 5.1.0) with a file upload field enabled and the &ldquo;Saving inquiry data in database&rdquo; option turned on.</li>
<li>The attacker crafts a malicious request to the WordPress site, targeting the file upload functionality of the MW WP Form plugin.</li>
<li>The attacker manipulates the file path within the request, exploiting the insufficient validation in the &lsquo;generate_user_filepath&rsquo; function to specify a target file for movement.</li>
<li>The &lsquo;move_temp_file_to_upload_dir&rsquo; function is triggered, attempting to move the uploaded file to the attacker-controlled path.</li>
<li>Due to the lack of proper validation, the targeted file (e.g., wp-config.php) is successfully moved to a new location on the server.</li>
<li>If wp-config.php is moved to a publicly accessible directory, the database credentials and other sensitive information become exposed.</li>
<li>The attacker retrieves the exposed wp-config.php file, extracting database credentials and other sensitive information.</li>
<li>Using the obtained database credentials, the attacker gains unauthorized access to the WordPress database, potentially leading to remote code execution or complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4347 allows unauthenticated attackers to move arbitrary files within the WordPress server&rsquo;s file system. This can lead to the exposure of sensitive configuration files like &lsquo;wp-config.php&rsquo;, leading to full database and site compromise. While the number of affected installations is currently unknown, a successful attack can have devastating consequences, including data theft, website defacement, and remote code execution. The impact is limited to sites using the vulnerable MW WP Form plugin with specific configuration settings enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MW WP Form plugin to the latest version (greater than 5.1.0) to patch CVE-2026-4347.</li>
<li>As a preventative measure, implement file integrity monitoring on critical files like &lsquo;wp-config.php&rsquo; to detect unauthorized modifications or movement. Use file_event logs to trigger alerts.</li>
<li>Deploy the Sigma rule &ldquo;Detect MW WP Form Arbitrary File Move Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review WordPress access logs for suspicious file upload requests, focusing on requests to the MW WP Form plugin&rsquo;s upload handler.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-move</category><category>rce</category></item><item><title>Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)</title><link>https://feed.craftedsignal.io/briefs/2024-01-query-monitor-xss/</link><pubDate>Tue, 31 Mar 2026 12:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-query-monitor-xss/</guid><description>The Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The Query Monitor plugin for WordPress, a developer tool panel, is susceptible to a reflected Cross-Site Scripting (XSS) vulnerability. Identified as CVE-2026-4267, this flaw exists in all versions up to and including 3.20.3. The vulnerability arises from the plugin&rsquo;s failure to adequately sanitize input and escape output related to the <code>$_SERVER['REQUEST_URI']</code> parameter. An unauthenticated attacker can exploit this by injecting malicious web scripts into pages, posing a threat to users who…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>reflected-xss</category><category>cve-2026-4267</category></item><item><title>Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)</title><link>https://feed.craftedsignal.io/briefs/2026-03-ssti-wordpress/</link><pubDate>Mon, 30 Mar 2026 22:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ssti-wordpress/</guid><description>The Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).</description><content:encoded><![CDATA[<p>The Contact Form by Supsystic plugin, a popular WordPress plugin, is susceptible to a critical Server-Side Template Injection (SSTI) vulnerability, identified as CVE-2026-4257. This vulnerability affects all versions up to and including 1.7.36. The root cause lies in the plugin&rsquo;s use of the Twig template engine (<code>Twig_Loader_String</code>) without proper sandboxing. This, combined with the <code>cfsPreFill</code> functionality, allows unauthenticated attackers to inject arbitrary Twig expressions into form…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssti</category><category>wordpress</category><category>rce</category><category>twig</category></item><item><title>Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)</title><link>https://feed.craftedsignal.io/briefs/2026-03-oxygen-theme-ssrf/</link><pubDate>Sat, 28 Mar 2026 04:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-oxygen-theme-ssrf/</guid><description>The Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.</description><content:encoded>&lt;p>The Oxygen Theme WordPress plugin, versions 6.0.8 and earlier, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2025-12886). This flaw allows unauthenticated attackers to send crafted requests to the WordPress server, potentially forcing it to make outbound connections to internal or external resources. The vulnerability is located within the &lt;code>laborator_calc_route&lt;/code> AJAX action. By exploiting this, attackers can potentially access sensitive internal resources, bypass firewall…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>wordpress</category><category>oxygen-theme</category><category>cve-2025-12886</category></item><item><title>Fluent Booking WordPress Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-fluentbooking-xss/</link><pubDate>Thu, 26 Mar 2026 14:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-fluentbooking-xss/</guid><description>The Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.</description><content:encoded><![CDATA[<p>CVE-2026-2231 describes a stored cross-site scripting (XSS) vulnerability within the Fluent Booking WordPress plugin. This vulnerability affects all versions up to and including 2.0.01. The root cause is insufficient input sanitization and output escaping of multiple parameters handled by the plugin. An unauthenticated attacker can exploit this vulnerability to inject malicious JavaScript code into the WordPress site. The injected script executes in the context of the victim&rsquo;s browser when they access the page containing the injected code, potentially leading to session hijacking, defacement, or other malicious activities. Successful exploitation grants the attacker the same privileges as the victim user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable parameter within the Fluent Booking plugin, specifically related to booking data.</li>
<li>The attacker crafts a malicious payload containing JavaScript code.</li>
<li>The attacker submits a request to the WordPress site with the crafted payload embedded within the vulnerable parameter (e.g., booking name, location, or other fields).</li>
<li>The WordPress server stores the malicious payload in the database due to insufficient sanitization.</li>
<li>A legitimate user (e.g., an administrator or another user viewing bookings) accesses a page displaying the stored booking data.</li>
<li>The malicious JavaScript code embedded in the booking data is rendered in the user&rsquo;s browser.</li>
<li>The injected script executes in the context of the user&rsquo;s session.</li>
<li>The attacker can potentially steal cookies, redirect the user to a malicious website, or perform other actions with the user&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in user&rsquo;s browser. This can lead to account compromise, including administrator accounts, potentially leading to full control of the WordPress website. Website defacement, data theft, and redirection to phishing sites are also potential impacts. Given the widespread use of WordPress and the Fluent Booking plugin, a successful widespread exploit could affect a large number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Fluent Booking plugin to a version greater than 2.0.01 to patch CVE-2026-2231.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious URI Parameters in WordPress</code> to detect potential XSS attempts against WordPress sites.</li>
<li>Monitor web server logs for suspicious URI parameters and user input, as detected by the <code>Detect WordPress XSS via URI Parameters</code> Sigma rule.</li>
<li>Implement a web application firewall (WAF) with rules to filter out common XSS payloads.</li>
<li>Regularly audit and sanitize user input within WordPress plugins and themes to prevent stored XSS vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-2231</category></item><item><title>Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-11-wordpress-blackhole-xss/</link><pubDate>Thu, 26 Mar 2026 05:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-11-wordpress-blackhole-xss/</guid><description>The Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.</description><content:encoded><![CDATA[<p>The Blackhole for Bad Bots plugin for WordPress, up to and including version 3.8, contains a stored cross-site scripting (XSS) vulnerability. The vulnerability stems from insufficient input sanitization and output escaping of the User-Agent HTTP header when capturing bot data. Specifically, the plugin uses <code>sanitize_text_field()</code> which strips HTML tags but does not escape HTML entities. This data is then stored using <code>update_option()</code> and later displayed on the Bad Bots log page. The stored data is output into HTML input value attributes and HTML span content without proper escaping via <code>esc_attr()</code> or <code>esc_html()</code>. This allows an unauthenticated attacker to inject arbitrary web scripts that are executed when an administrator views the Blackhole Bad Bots admin page, potentially leading to privilege escalation or other malicious actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a request to the WordPress site with a malicious User-Agent header containing XSS payload.</li>
<li>The Blackhole for Bad Bots plugin captures the User-Agent string using <code>sanitize_text_field()</code>, which inadequately sanitizes the input.</li>
<li>The plugin stores the inadequately sanitized User-Agent string in the WordPress options database using <code>update_option()</code>.</li>
<li>A WordPress administrator navigates to the Blackhole Bad Bots admin page.</li>
<li>The plugin retrieves the stored User-Agent strings from the database.</li>
<li>The plugin outputs the stored User-Agent string directly into HTML input value attributes (lines 75-83) without <code>esc_attr()</code> and into HTML span content without <code>esc_html()</code> on the admin page.</li>
<li>The administrator&rsquo;s browser executes the injected XSS payload.</li>
<li>The XSS payload can perform actions such as stealing the administrator&rsquo;s session cookie, redirecting the administrator to a malicious site, or performing actions on behalf of the administrator.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to inject arbitrary web scripts that execute in the context of an administrator&rsquo;s browser session. This can lead to various malicious outcomes, including account takeover, data theft, and defacement of the WordPress site. Given the widespread use of WordPress and the Blackhole for Bad Bots plugin, a successful exploit could impact a significant number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Blackhole for Bad Bots plugin to a version greater than 3.8 to remediate CVE-2026-4329.</li>
<li>Implement a Web Application Firewall (WAF) rule to filter requests containing suspicious User-Agent headers that might exploit CVE-2026-4329.</li>
<li>Monitor web server logs for requests with unusual or potentially malicious User-Agent strings to detect potential exploitation attempts related to CVE-2026-4329.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>plugin</category><category>cve-2026-4329</category></item><item><title>Masteriyo LMS WordPress Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-masteriyo-privesc/</link><pubDate>Thu, 26 Mar 2026 02:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-masteriyo-privesc/</guid><description>The Masteriyo LMS plugin for WordPress is vulnerable to privilege escalation, allowing authenticated users with student-level access or higher to gain administrator privileges by manipulating the 'InstructorsController::prepare_object_for_database' function.</description><content:encoded><![CDATA[<p>The Masteriyo LMS plugin, a learning management system for WordPress, contains a privilege escalation vulnerability (CVE-2026-4484) affecting versions up to and including 2.1.6. This flaw allows authenticated users, even those with low-level &ldquo;Student&rdquo; access, to elevate their privileges to that of an administrator. The vulnerability stems from a lack of proper authorization checks within the <code>InstructorsController::prepare_object_for_database</code> function, enabling malicious users to modify user roles. Successful exploitation grants attackers full control over the WordPress site, leading to potential data breaches, defacement, or complete takeover. This vulnerability poses a significant threat to educational institutions and other organizations using the Masteriyo LMS plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the WordPress site as a student or with any role above student.</li>
<li>Attacker crafts a malicious HTTP request targeting the REST API endpoint associated with the <code>InstructorsController</code>.</li>
<li>The attacker includes a modified user role parameter within the request, specifically attempting to change their role to &ldquo;administrator.&rdquo;</li>
<li>The request is sent to the <code>/wp-json/masteriyo/v1/instructors</code> endpoint.</li>
<li>The <code>InstructorsController::prepare_object_for_database</code> function processes the request without proper authorization checks.</li>
<li>The function updates the attacker&rsquo;s user role in the WordPress database to &ldquo;administrator&rdquo;.</li>
<li>The attacker logs out and back in to the WordPress site.</li>
<li>The attacker now has full administrator privileges and can perform any action within the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any authenticated user to gain complete control over the affected WordPress site. This can lead to significant data breaches, where sensitive student or course data is compromised. The attacker can deface the website, install malicious plugins, or even completely take over the server. Given the widespread use of WordPress and the Masteriyo LMS plugin in educational settings, a successful attack could impact thousands of students and instructors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Masteriyo LMS plugin to the latest available version, which patches CVE-2026-4484.</li>
<li>Monitor WordPress web server logs for suspicious POST requests to <code>/wp-json/masteriyo/v1/instructors</code> attempting to modify user roles.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts targeting the vulnerable <code>InstructorsController::prepare_object_for_database</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>cve-2026-4484</category></item><item><title>WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)</title><link>https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-file-deletion/</link><pubDate>Thu, 26 Mar 2026 00:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-file-deletion/</guid><description>The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The WP Job Portal plugin for WordPress versions up to and including 2.4.9 is susceptible to an arbitrary file deletion vulnerability (CVE-2026-4758). The vulnerability stems from insufficient file path validation within the <code>WPJOBPORTALcustomfields::removeFileCustom</code> function. Authenticated attackers with Subscriber-level access or higher can exploit this flaw to delete arbitrary files on the server. Successful exploitation allows attackers to delete critical files such as <code>wp-config.php</code>…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>wordpress</category><category>file-deletion</category><category>remote-code-execution</category></item><item><title>WP Job Portal Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</guid><description>The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.</description><content:encoded><![CDATA[<p>The WP Job Portal plugin for WordPress, a widely used plugin for managing job listings, is susceptible to SQL Injection attacks. This vulnerability, identified as CVE-2026-4306, affects all versions up to and including 2.4.8. The flaw stems from the insufficient sanitization of the &lsquo;radius&rsquo; parameter, which is directly incorporated into SQL queries without proper escaping. This lack of input validation enables unauthenticated attackers to inject malicious SQL code into the application&rsquo;s database queries. Successful exploitation could lead to the unauthorized disclosure of sensitive information stored within the WordPress database. Given the popularity of WordPress and the WP Job Portal plugin, a successful attack could impact a large number of websites and expose confidential data, including user credentials, financial details, and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP request targeting the WordPress website running the vulnerable WP Job Portal plugin.</li>
<li>The attacker appends a SQL injection payload to the &lsquo;radius&rsquo; parameter within the HTTP request.</li>
<li>The vulnerable plugin receives the request and incorporates the unsanitized &lsquo;radius&rsquo; parameter into an SQL query within <code>includes/ajax.php</code> or <code>modules/job/model.php</code>.</li>
<li>The injected SQL code is executed against the WordPress database due to the lack of proper input validation and escaping.</li>
<li>The attacker leverages the SQL injection to extract sensitive information from the database, such as user credentials, API keys, or other confidential data.</li>
<li>The extracted data may be exfiltrated from the server using various techniques.</li>
<li>The attacker could potentially use the compromised data to gain further access to the WordPress site or connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-4306) could lead to the complete compromise of the WordPress database. Attackers could gain access to sensitive information, including user credentials, customer data, and confidential business information. The vulnerability impacts all users running WP Job Portal plugin versions 2.4.8 and earlier. The CVSS v3.1 score is 7.5, indicating a high severity risk. The impact includes unauthorized data access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Job Portal plugin to version 2.4.9 or later to patch the SQL Injection vulnerability (CVE-2026-4306).</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL Injection attempts targeting the &lsquo;radius&rsquo; parameter in WordPress plugins.</li>
<li>Enable detailed logging for your web server (category &ldquo;webserver&rdquo;, product &ldquo;linux|windows&rdquo;) to monitor for suspicious activity and potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>ReviewX WordPress Plugin Arbitrary Method Call Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-reviewx-rce/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-reviewx-rce/</guid><description>The ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.</description><content:encoded><![CDATA[<p>The ReviewX – WooCommerce Product Reviews plugin for WordPress, a tool designed to enhance product reviews, contains a critical vulnerability. Identified as CVE-2025-10679, this flaw stems from insufficient input validation within the <code>bulkTenReviews</code> function. Exploitation allows unauthenticated attackers to invoke arbitrary PHP class methods that either require no input or can utilize default values. This vulnerability affects ReviewX plugin versions up to and including 2.2.12. Successful exploitation can lead to sensitive information disclosure or, under certain server configurations and available methods, remote code execution. This poses a significant risk to e-commerce sites utilizing the vulnerable plugin, potentially impacting customer data and overall site integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the WordPress server targeting the vulnerable <code>bulkTenReviews</code> function in the ReviewX plugin.</li>
<li>The crafted request includes malicious input designed to bypass the insufficient input validation within the <code>bulkTenReviews</code> function.</li>
<li>The <code>bulkTenReviews</code> function processes the attacker-controlled data without proper sanitization.</li>
<li>The unsanitized input is passed to a variable function call mechanism, allowing the attacker to specify an arbitrary PHP class method.</li>
<li>The attacker leverages this vulnerability to call a PHP class method that requires no inputs or has default values.</li>
<li>Depending on the available methods and server configuration, the attacker may be able to trigger sensitive information disclosure.</li>
<li>In more critical scenarios, the attacker might be able to call methods that allow writing to the file system or executing arbitrary commands, leading to remote code execution.</li>
<li>The attacker gains control of the WordPress server, enabling them to install malware, steal data, or deface the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-10679 can lead to a range of damaging consequences. Sensitive information, such as customer data and administrative credentials, may be exposed. In the worst-case scenario, attackers can achieve remote code execution, granting them complete control over the affected WordPress server. This can result in website defacement, data theft, malware installation, and denial-of-service attacks. Given the wide usage of WooCommerce and ReviewX, a successful widespread attack could impact numerous e-commerce businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the ReviewX plugin to the latest version (greater than 2.2.12) to patch CVE-2025-10679.</li>
<li>Deploy the Sigma rule <code>Detect ReviewX Arbitrary Method Calls</code> to detect exploitation attempts targeting the <code>bulkTenReviews</code> function.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress plugins with unusual parameters, as highlighted in the Sigma rule <code>Detect ReviewX Arbitrary Method Calls</code>.</li>
<li>Review PHP configurations to harden against potential RCE attempts stemming from arbitrary method calls.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>woocommerce</category><category>reviewx</category><category>rce</category><category>vulnerability</category></item><item><title>Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)</title><link>https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</link><pubDate>Tue, 24 Mar 2026 00:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-contest-gallery-auth-bypass/</guid><description>CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.</description><content:encoded><![CDATA[<p>The Contest Gallery plugin for WordPress, versions up to and including 28.1.5, is vulnerable to a critical authentication bypass (CVE-2026-4021). This vulnerability stems from how the <code>users-registry-check-after-email-or-pin-confirmation.php</code> script handles email confirmations, combined with an unauthenticated key-based login endpoint in <code>ajax-functions-frontend.php</code>.  If the <code>RegMailOptional=1</code> setting is enabled (non-default), an attacker can register a new user account with a specially…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>authentication-bypass</category><category>plugin-vulnerability</category><category>cve-2026-4021</category></item><item><title>WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-maps-sqli/</link><pubDate>Mon, 23 Mar 2026 00:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-maps-sqli/</guid><description>The WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The WP Maps – Store Locator, Google Maps, OpenStreetMap, Mapbox, Listing, Directory &amp; Filters plugin for WordPress, a widely used plugin for integrating map functionality into WordPress sites, contains a critical time-based SQL Injection vulnerability. Assigned CVE-2026-2580, this flaw affects all versions up to and including 4.9.1. The vulnerability lies within the &lsquo;orderby&rsquo; parameter, where insufficient input sanitization allows unauthenticated attackers to inject malicious SQL queries. By…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>sqli</category><category>cve-2026-2580</category><category>web-application</category></item><item><title>Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)</title><link>https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</link><pubDate>Mon, 24 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</guid><description>CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.</description><content:encoded><![CDATA[<p>The Otter Blocks plugin, a popular WordPress extension, is susceptible to a purchase verification bypass vulnerability identified as CVE-2026-2892. This flaw affects all versions up to and including 3.1.4. The vulnerability stems from the plugin&rsquo;s reliance on an unsigned cookie, &lsquo;o_stripe_data&rsquo;, to determine Stripe product ownership for unauthenticated users. The &lsquo;get_customer_data&rsquo; method uses this cookie, and the subsequent &lsquo;check_purchase&rsquo; method trusts its contents without proper server-side validation against the Stripe API. This lack of verification enables attackers to gain unauthorized access to purchase-gated content. The target product ID is often exposed in the checkout block&rsquo;s HTML source, further simplifying the exploit. Successful exploitation allows attackers to bypass payment requirements, potentially impacting content creators and businesses relying on the plugin for revenue generation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Otter Blocks plugin (version &lt;= 3.1.4).</li>
<li>The attacker examines the HTML source code of a checkout block on the target site to identify the target product ID.</li>
<li>The attacker crafts a malicious &lsquo;o_stripe_data&rsquo; cookie containing the target product ID.</li>
<li>The attacker sets the forged &lsquo;o_stripe_data&rsquo; cookie in their browser.</li>
<li>The attacker navigates to the purchase-gated content on the WordPress site.</li>
<li>The &lsquo;get_customer_data&rsquo; method reads the forged &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>The &lsquo;check_purchase&rsquo; method incorrectly validates the forged purchase data without server-side verification against the Stripe API.</li>
<li>The attacker gains unauthorized access to the purchase-gated content, bypassing the intended payment requirement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2892 allows unauthenticated attackers to bypass purchase verification mechanisms implemented by the Otter Blocks plugin. This can lead to unauthorized access to premium content, resulting in revenue loss for content creators and businesses using the plugin. The number of potentially affected websites is significant, given the popularity of WordPress and the Otter Blocks plugin. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Otter Blocks plugin to a version greater than 3.1.4 to patch CVE-2026-2892.</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts targeting the vulnerable plugin.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious cookie manipulation activity, specifically targeting the &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>Implement server-side validation of purchase data against the Stripe API to prevent cookie forgery attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>purchase-bypass</category><category>CVE-2026-2892</category><category>defense-evasion</category></item><item><title>Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</link><pubDate>Thu, 29 Feb 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-breeze-cache-rce/</guid><description>The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The Breeze Cache plugin for WordPress, in versions up to and including 2.4.4, contains an arbitrary file upload vulnerability (CVE-2026-3844). This flaw stems from the lack of file type validation within the &lsquo;fetch_gravatar_from_remote&rsquo; function. An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the affected WordPress site&rsquo;s server. Successful exploitation could lead to remote code execution on the server. It is important to note that the vulnerability can only be exploited if the &ldquo;Host Files Locally - Gravatars&rdquo; setting is enabled within the Breeze Cache plugin. This setting is disabled by default, reducing the attack surface. Defenders should prioritize identifying potentially compromised systems running vulnerable versions of Breeze Cache with the &ldquo;Host Files Locally - Gravatars&rdquo; option enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 2.4.4) of the Breeze Cache plugin.</li>
<li>The attacker confirms the &ldquo;Host Files Locally - Gravatars&rdquo; option is enabled on the target WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;fetch_gravatar_from_remote&rsquo; function. This request contains a payload designed to upload an arbitrary file to the server.</li>
<li>Due to the missing file type validation, the server accepts the malicious file upload without proper sanitization. The uploaded file can be a PHP file, a web shell, or another executable type.</li>
<li>The attacker determines the location where the file has been saved by the plugin.</li>
<li>The attacker sends an HTTP request to the uploaded file&rsquo;s location, triggering its execution on the server.</li>
<li>The malicious file executes, granting the attacker remote code execution capabilities on the web server.</li>
<li>The attacker can then perform actions such as installing malware, stealing sensitive data, or further compromising the server and network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to upload arbitrary files to a vulnerable WordPress server. This can lead to complete compromise of the server, allowing for remote code execution. The attacker can then pivot to other systems, steal sensitive information, or cause significant disruption. While the &ldquo;Host Files Locally - Gravatars&rdquo; option is disabled by default, any instance where this option is enabled is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Breeze Cache plugin to the latest version to patch CVE-2026-3844.</li>
<li>Disable the &ldquo;Host Files Locally - Gravatars&rdquo; setting in the Breeze Cache plugin if it is enabled.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious file uploads and requests to unusual file extensions using the provided Sigma rules.</li>
<li>Implement strict file upload policies and validation mechanisms on all web applications to prevent arbitrary file uploads.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-upload</category><category>rce</category></item><item><title>Royal Elementor Addons Plugin SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin, a popular WordPress extension, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-6229) in versions up to and including 1.7.1057. This flaw stems from inadequate validation of user-provided URLs within the <code>render_csv_data()</code> function. Attackers can bypass the validation by including &lsquo;docs.google.com/spreadsheets&rsquo; in a query parameter. The vulnerability is triggered because the plugin uses these URLs in <code>fopen()</code> calls without implementing adequate safeguards to prevent access to internal or private network addresses. This vulnerability enables authenticated attackers with Contributor-level access or higher to craft malicious requests, potentially exposing sensitive internal data. Successful exploitation allows attackers to probe internal network resources, access configuration files, and potentially escalate attacks further.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Contributor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>render_csv_data()</code> function within the Royal Elementor Addons plugin.</li>
<li>The malicious request includes a user-supplied URL containing &lsquo;docs.google.com/spreadsheets&rsquo; within a query parameter to bypass initial validation checks.</li>
<li>The plugin&rsquo;s <code>render_csv_data()</code> function receives the crafted URL without proper sanitization or validation against internal or private network addresses.</li>
<li>The <code>fopen()</code> function is called with the attacker-controlled URL, initiating an outbound request from the WordPress server.</li>
<li>If the URL points to an internal resource, the WordPress server retrieves the resource content.</li>
<li>The attacker receives the content of the internal resource in the response from the WordPress server.</li>
<li>The attacker analyzes the retrieved content for sensitive information, such as configuration files, API keys, or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-6229) can lead to the exposure of sensitive internal information, potentially impacting all organizations using the Royal Elementor Addons plugin for WordPress version 1.7.1057 and below. This may include internal configuration files, API keys, database credentials, or other sensitive data accessible through internal services. The severity is high due to the potential for attackers to pivot from this vulnerability and further compromise the WordPress server or the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to a version higher than 1.7.1057 to patch CVE-2026-6229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Royal Elementor Addons SSRF Attempt via URL Parameter&rdquo; to identify malicious requests targeting the <code>render_csv_data()</code> function in your web server logs.</li>
<li>Implement strict network segmentation and firewall rules to limit access from the WordPress server to internal resources, mitigating the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>ssrf</category><category>cve-2026-6229</category><category>plugin</category></item><item><title>WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</guid><description>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.</description><content:encoded><![CDATA[<p>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress, in versions up to and including 1.1.3, contains an arbitrary file upload vulnerability tracked as CVE-2026-5364. The flaw stems from insufficient sanitization of file extensions during the upload process. Specifically, the plugin extracts the file extension before sanitization and allows the file type parameter to be controlled by the attacker. Furthermore, validation occurs on the unsanitized extension, while the file is saved with a sanitized extension, stripping special characters like &lsquo;$&rsquo; during the save. While an .htaccess file and name randomization are present, these restrictions may be bypassable in certain configurations or by exploiting other vulnerabilities. This vulnerability could allow unauthenticated attackers to upload arbitrary PHP files to the web server, potentially leading to remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.1.3) of the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the plugin&rsquo;s upload endpoint, typically <code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>.</li>
<li>The POST request includes a file with a manipulated extension, such as <code>evil.php$.jpg</code>, where <code>evil.php</code> is the malicious PHP payload and <code>$.jpg</code> is designed to be sanitized to <code>.jpg</code>.</li>
<li>The attacker modifies the <code>file type</code> parameter in the request to reflect the original manipulated file extension (<code>evil.php$.jpg</code>).</li>
<li>The plugin validates the extension against administrator-configured types but, due to the unsanitized extension and attacker control over the file type parameter, the malicious file passes validation.</li>
<li>The plugin sanitizes the extension, removing the <code>$</code> character, resulting in a file saved with the extension <code>.php</code>.</li>
<li>The attacker attempts to access the uploaded PHP file via a direct HTTP request to <code>/wp-content/uploads/&lt;random_name&gt;.php</code>.</li>
<li>If the <code>.htaccess</code> restrictions are bypassed (e.g., due to misconfiguration or another vulnerability), the web server executes the malicious PHP code, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5364 allows unauthenticated attackers to upload and execute arbitrary PHP code on the target WordPress server. This can lead to complete compromise of the website, including defacement, data theft, and installation of backdoors. While the presence of <code>.htaccess</code> and name randomization mitigates the risk, these protections may be bypassed, especially when combined with other vulnerabilities or misconfigurations. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to a large number of websites. The CVSS v3.1 base score is 8.1, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin to the latest version (greater than 1.1.3) to patch CVE-2026-5364.</li>
<li>Implement a Web Application Firewall (WAF) rule to inspect and block requests containing suspicious file extensions in the POST parameters targeting the plugin&rsquo;s upload endpoint (<code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious File Upload via Drag and Drop CF7</code> to identify exploitation attempts in web server logs (cs-uri-query).</li>
<li>Review and harden <code>.htaccess</code> configurations to ensure that PHP execution is restricted in the <code>/wp-content/uploads/</code> directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>plugin</category><category>CVE-2026-5364</category></item><item><title>WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</guid><description>An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The Profile Builder Pro plugin for WordPress is susceptible to a critical PHP Object Injection vulnerability (CVE-2026-7647) affecting all versions up to and including 3.14.5. This flaw stems from the plugin&rsquo;s use of the <code>maybe_unserialize()</code> function on the attacker-controlled <code>args</code> POST parameter passed to the <code>wppb_request_users_pins_action_callback()</code> AJAX handler. Critically, this handler lacks nonce verification, input validation, and type checking, making it accessible to unauthenticated users via both <code>wp_ajax_</code> and <code>wp_ajax_nopriv_</code> hooks. Successful exploitation allows remote, unauthenticated attackers to inject arbitrary PHP objects into the application&rsquo;s memory space, potentially leading to remote code execution depending on available classes and application configuration. The vulnerability was published on 2026-05-02.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 3.14.5) of the Profile Builder Pro plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress AJAX endpoint (<code>/wp-admin/admin-ajax.php</code>).</li>
<li>The POST request includes the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code>.</li>
<li>The POST request includes the <code>args</code> parameter containing a serialized PHP object designed to trigger arbitrary code execution upon deserialization.</li>
<li>The WordPress server receives the request and invokes the <code>wppb_request_users_pins_action_callback()</code> function.</li>
<li>The vulnerable function calls <code>maybe_unserialize()</code> on the attacker-controlled <code>args</code> parameter without proper sanitization or validation.</li>
<li>The malicious PHP object is deserialized and injected into the application&rsquo;s memory space.</li>
<li>The injected object&rsquo;s methods and properties are triggered, leading to arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary PHP code on the target WordPress server. This can lead to complete system compromise, including data theft, website defacement, and the installation of backdoors for persistent access. Given the widespread use of WordPress and the Profile Builder Pro plugin, a large number of websites are potentially at risk until the plugin is updated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Profile Builder Pro plugin to the latest available version to patch CVE-2026-7647.</li>
<li>Deploy the provided Sigma rule <code>Detect Profile Builder Pro PHP Object Injection Attempt</code> to detect exploitation attempts targeting the vulnerable AJAX endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code> and suspicious serialized data in the <code>args</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>php-object-injection</category><category>wordpress</category><category>plugin</category><category>rce</category></item><item><title>WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-privesc/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-privesc/</guid><description>Highland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.</description><content:encoded><![CDATA[<p>The Highland Software Custom Role Manager plugin, versions up to and including 1.0.0, is vulnerable to privilege escalation. The vulnerability, identified as CVE-2026-7106, stems from a lack of sufficient authorization checks within the <code>hscrm_save_user_roles()</code> function. This function is accessible to any authenticated user via the <code>personal_options_update</code> action. This allows an attacker with minimal privileges (subscriber level or higher) to potentially elevate their own privileges or those of other users by manipulating user roles through the profile update form. Successful exploitation grants attackers the ability to perform actions reserved for higher-level administrators, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid credentials for a WordPress user account with at least subscriber-level privileges.</li>
<li>The attacker authenticates to the WordPress site using their credentials.</li>
<li>The attacker accesses their user profile page, typically located at <code>/wp-admin/profile.php</code>.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>personal_options_update</code> action, modifying the <code>wp_capabilities</code> user meta field. The request is designed to bypass the insufficient authorization checks in the <code>hscrm_save_user_roles()</code> function.</li>
<li>The crafted request is submitted through the profile update form. This likely involves intercepting and modifying the POST request sent when the user clicks the &ldquo;Update Profile&rdquo; button.</li>
<li>The <code>hscrm_save_user_roles()</code> function is triggered, and due to the missing authorization checks, the attacker&rsquo;s modified user roles are saved to the database.</li>
<li>The attacker&rsquo;s account now possesses elevated privileges, such as administrator or editor roles, depending on the attacker&rsquo;s goal and the payload in the malicious request.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7106 allows attackers with minimal privileges to gain administrative control over the WordPress site. This can lead to a variety of malicious activities, including defacement, malware injection, data theft, and denial of service. Given the widespread use of WordPress, this vulnerability poses a significant risk to websites using the affected plugin. A successful attack can result in complete compromise of the affected website.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Highland Software Custom Role Manager plugin to a patched version that addresses CVE-2026-7106.</li>
<li>Monitor WordPress access logs for suspicious POST requests to <code>/wp-admin/profile.php</code> targeting the <code>personal_options_update</code> action to detect exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WordPress Role Updates</code> to identify attempts to modify user roles from subscriber-level accounts.</li>
<li>Review user roles and permissions regularly to identify and remediate any unauthorized privilege escalations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cve</category></item><item><title>WebPros cPanel &amp; WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel &amp; WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>WebPros cPanel &amp; WHM (WebHost Manager) and WP2 (WordPress Squared) are affected by an authentication bypass vulnerability, identified as CVE-2026-41940. This flaw exists within the login flow, potentially granting unauthenticated remote attackers unauthorized access to the control panel. Successful exploitation allows attackers to bypass normal authentication mechanisms and directly access sensitive administrative functions within cPanel &amp; WHM and WP2. Defenders should apply vendor-provided mitigations or discontinue use of the product if mitigations are not available. The vulnerability was disclosed in April 2026, and mitigations should be applied by May 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable cPanel &amp; WHM or WP2 instance.</li>
<li>The attacker crafts a malicious HTTP request exploiting the authentication bypass vulnerability in the login flow.</li>
<li>The request is sent to the target server, bypassing authentication checks.</li>
<li>The server incorrectly processes the request, granting the attacker an authenticated session.</li>
<li>The attacker leverages the authenticated session to access administrative interfaces and settings.</li>
<li>The attacker modifies server configurations, potentially creating new administrative accounts.</li>
<li>The attacker installs malicious plugins or software through the control panel.</li>
<li>The attacker achieves full control over the web server and hosted websites.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of the affected cPanel &amp; WHM or WP2 server. This can result in data breaches, website defacement, malware distribution, and denial-of-service attacks. The impact is significant due to the widespread use of cPanel &amp; WHM in web hosting environments. Compromised servers could be leveraged for further attacks against other systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by WebPros as detailed in their security update advisory to address CVE-2026-41940.</li>
<li>Deploy the Sigma rule &ldquo;Detect cPanel/WHM Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>If mitigations cannot be immediately applied, follow BOD 22-01 guidance for cloud services, potentially isolating the affected system until patched.</li>
<li>Consider discontinuing use of the affected product if patches or mitigations are unavailable, as advised in the original CISA KEV entry.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>wp2</category><category>wordpress</category><category>authentication-bypass</category><category>cve-2026-41940</category><category>initial-access</category></item><item><title>Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-gravity-forms-xss/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gravity-forms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to unauthenticated stored cross-site scripting (XSS) in versions up to 2.10.0, allowing attackers to inject arbitrary JavaScript code into the product name field within repeater fields, which executes when an administrator views the affected entry.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin, a widely used WordPress plugin, is susceptible to an unauthenticated stored cross-site scripting (XSS) vulnerability. This flaw, identified as CVE-2026-5110, affects versions up to and including 2.10.0. The vulnerability stems from inadequate input validation and output escaping specifically within the SingleProduct field when it is nested inside a Repeater field. This bypasses normal state validation, allowing attackers to inject malicious HTML and JavaScript into the product name field. The injected payload is then stored unsanitized in the database. This vulnerability allows unauthenticated attackers to inject arbitrary web scripts that execute whenever an administrator accesses an entry containing the malicious payload through the WordPress admin interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious request to a WordPress endpoint utilizing the Gravity Forms plugin.</li>
<li>The attacker injects arbitrary HTML and JavaScript into the &lsquo;product name&rsquo; field (input .1) of a SingleProduct field nested within a Repeater field.</li>
<li>Due to insufficient validation within the <code>validate_subfield()</code> method, the malicious input bypasses the state validation mechanism <code>(failed_state_validation())</code>.</li>
<li>The <code>sanitize_entry_value()</code> method returns the raw, unsanitized value because HTML is not expected for the affected field type.</li>
<li>The malicious input is stored in the WordPress database without proper sanitization or escaping.</li>
<li>An administrator accesses the Gravity Forms entries page in the WordPress admin interface (wp-admin/admin.php?page=gf_entries).</li>
<li>The <code>get_value_entry_detail()</code> method retrieves the malicious product name from the database and outputs it without proper escaping.</li>
<li>The stored XSS payload executes in the administrator&rsquo;s browser, potentially allowing the attacker to perform actions with the administrator&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of an administrator&rsquo;s browser session. This can lead to account compromise, data theft, or further malicious activities within the WordPress administration panel. The vulnerability affects all users of the Gravity Forms plugin on WordPress installations with versions up to and including 2.10.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to the latest version (greater than 2.10.0) to patch CVE-2026-5110.</li>
<li>Deploy the provided Sigma rule <code>Detect Gravity Forms XSS Attempt</code> to identify potential exploitation attempts by monitoring for specific patterns in HTTP requests.</li>
<li>Enable web server logging to capture detailed information about HTTP requests and responses, enabling the Sigma rule&rsquo;s effectiveness.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category></item><item><title>ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)</title><link>https://feed.craftedsignal.io/briefs/2024-01-armember-sqli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-armember-sqli/</guid><description>A time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (&lt;= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile &amp; User signup plugin for WordPress is susceptible to time-based blind SQL injection. This vulnerability, identified as CVE-2026-7649, affects all versions up to and including 4.0.60. The root cause lies in the inadequate escaping of the user-supplied &lsquo;orderby&rsquo; parameter and the lack of sufficient preparation in the existing SQL query. An unauthenticated attacker can exploit this weakness by injecting malicious SQL queries, potentially leading to the extraction of sensitive information directly from the WordPress database. This presents a significant risk, as it could expose user credentials, personal data, and other confidential information stored within the database, impacting the confidentiality and integrity of the WordPress installation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable ARMember plugin (version &lt;= 4.0.60).</li>
<li>The attacker crafts a malicious HTTP request targeting a page that uses the vulnerable &lsquo;orderby&rsquo; parameter.</li>
<li>The attacker injects SQL code into the &lsquo;orderby&rsquo; parameter of the HTTP GET or POST request. This code is designed to exploit the time-based blind SQL injection vulnerability.</li>
<li>The ARMember plugin processes the request without properly sanitizing the &lsquo;orderby&rsquo; parameter, allowing the injected SQL code to be executed within the database query.</li>
<li>The injected SQL code uses time-delay functions (e.g., <code>SLEEP()</code>) to determine the truthiness of conditions. Based on the response time, the attacker infers whether the injected SQL code is evaluating to true or false.</li>
<li>The attacker iteratively refines the injected SQL code to extract sensitive data, such as table names, column names, and data values, character by character, through observing the time delays.</li>
<li>The attacker dumps sensitive information from the database.</li>
<li>The attacker uses the extracted credentials to gain administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. This includes user credentials (usernames, email addresses, and password hashes), personal data, and potentially other confidential information stored within the database. The impact could range from unauthorized access to user accounts to complete compromise of the WordPress site and its underlying data. The number of affected sites depends on the prevalence of the ARMember plugin, but given its popularity, the potential impact is widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches provided by the ARMember plugin developers immediately to remediate CVE-2026-7649 on all WordPress installations using the plugin.</li>
<li>Deploy the Sigma rule &ldquo;Detect ARMember SQL Injection Attempt via Orderby Parameter&rdquo; to your SIEM to detect exploitation attempts against this vulnerability.</li>
<li>Monitor web server logs for suspicious requests containing SQL syntax in the &lsquo;orderby&rsquo; parameter to identify potential exploitation attempts (log source: webserver).</li>
<li>Implement and enforce strict input validation and sanitization for all user-supplied parameters, especially those used in database queries, to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>armember</category><category>cve-2026-7649</category></item><item><title>Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a widely used form management tool, contains a vulnerability that can be exploited by unauthenticated attackers. Specifically, versions up to and including 2.10.0 are susceptible to Stored Cross-Site Scripting (XSS) due to insufficient input validation and output escaping of Calculation Product field names within Repeater fields. This flaw resides in how the plugin processes and renders form submissions containing malicious HTML within the product name field. The vulnerability allows an attacker to inject arbitrary web scripts that execute in the context of an authenticated administrator&rsquo;s session when they access the entry detail page within the WordPress admin panel. Successful exploitation enables attackers to perform actions with the privileges of the compromised administrator.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious form submission.</li>
<li>The malicious payload is placed in the Calculation Product field&rsquo;s product name (.1) within a Repeater field.</li>
<li>The <code>validate()</code> method in the <code>GF_Field_Calculation</code> class inadequately validates the product name field, failing to sanitize malicious HTML.</li>
<li>The <code>sanitize_entry_value()</code> method returns the raw, unsanitized value for the product name field, as HTML sanitization is not expected for this field.</li>
<li>The malicious form submission is saved as an entry in WordPress.</li>
<li>An authenticated administrator with the <code>gravityforms_view_entries</code> capability accesses the entry detail page in <code>wp-admin</code>.</li>
<li>The <code>get_value_entry_detail()</code> method concatenates the unsanitized product name directly into the output string.</li>
<li>The repeater&rsquo;s <code>get_value_entry_detail()</code> method renders the unsanitized output, leading to the execution of the injected XSS payload within the administrator&rsquo;s browser.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to execute arbitrary JavaScript code within the context of an authenticated WordPress administrator&rsquo;s session. This can lead to account takeover, data theft, or further malicious actions performed on the WordPress site. While the number of potentially affected sites is large due to the plugin&rsquo;s popularity, the impact is limited to administrators who access the specific entry containing the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to a version greater than 2.10.0 to patch CVE-2026-5112.</li>
<li>Implement the Sigma rule <code>Detect Gravity Forms XSS via Product Name</code> to detect attempts to inject malicious scripts into product names.</li>
<li>Review and audit existing Gravity Forms entries for suspicious content in Calculation Product fields to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category></item><item><title>ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</guid><description>The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5464, exists in the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin, affecting all versions up to and including 9.1.2. The vulnerability allows authenticated attackers with Editor-level access or higher, who also possess the &rsquo;exactmetrics_view_dashboard&rsquo; capability, to install and activate arbitrary WordPress plugins from attacker-controlled URLs. This is possible due to the exposure of the &lsquo;onboarding_key&rsquo; transient and the lack of proper authorization checks on the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Successful exploitation can lead to Remote Code Execution (RCE) on the target WordPress site. This poses a significant risk to websites using the vulnerable plugin, as attackers can inject malicious code and gain full control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site as an Editor or Administrator.</li>
<li>The attacker obtains the &lsquo;onboarding_key&rsquo; by accessing the reports page, which exposes the transient value to users with the &rsquo;exactmetrics_view_dashboard&rsquo; capability.</li>
<li>The attacker uses the &lsquo;onboarding_key&rsquo; to access the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint, receiving a one-time hash (OTH) token.</li>
<li>The attacker crafts a malicious plugin ZIP file hosted on an attacker-controlled server.</li>
<li>The attacker sends a request to the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint, providing the OTH token and the URL of the malicious plugin ZIP file via the &lsquo;file&rsquo; parameter. This endpoint lacks capability checks and nonce verification.</li>
<li>The ExactMetrics plugin downloads the malicious plugin ZIP file from the attacker-controlled URL.</li>
<li>The ExactMetrics plugin installs and activates the malicious plugin.</li>
<li>The attacker gains Remote Code Execution on the WordPress server through the installed malicious plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5464 allows attackers to install arbitrary plugins on vulnerable WordPress sites, leading to Remote Code Execution. This grants the attacker complete control over the compromised website, enabling them to inject malicious code, deface the site, steal sensitive data, or use the site for further malicious activities. The number of affected websites depends on the widespread use of the ExactMetrics plugin. Organizations using this plugin are at risk of significant data breaches and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin to the latest version, which patches CVE-2026-5464.</li>
<li>Monitor web server logs for suspicious requests to the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint and the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Implement the Sigma rule provided below to detect exploitation attempts.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to WordPress accounts.</li>
<li>Restrict the &rsquo;exactmetrics_view_dashboard&rsquo; capability to only the necessary users.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>rce</category><category>cve-2026-5464</category><category>exactmetrics</category></item><item><title>Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</guid><description>The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.</description><content:encoded><![CDATA[<p>The Brizy – Page Builder plugin for WordPress, a popular tool for designing website pages, contains a critical vulnerability that allows unauthenticated users to inject malicious JavaScript code. Specifically, versions up to and including 2.8.11 are affected. This vulnerability arises from a combination of factors, including the lack of nonce verification for form submissions from non-logged-in users, inadequate handling of FileUpload fields when no file is actually uploaded, and the unintended reversal of security encoding through <code>html_entity_decode()</code> before outputting data. This allows attackers to inject arbitrary web scripts that execute in the context of a logged-in administrator viewing the form&rsquo;s &ldquo;Leads&rdquo; page, potentially leading to account takeover, data theft, or further compromise of the WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing JavaScript code.</li>
<li>The attacker submits this payload through a Brizy form on the WordPress site, exploiting the missing nonce verification in the <code>submit_form()</code> function.</li>
<li>The <code>handleFileTypeFields()</code> function fails to properly sanitize or overwrite the attacker-supplied values when no file is attached to the form submission.</li>
<li>The injected payload, now stored in the WordPress database, bypasses initial <code>htmlentities()</code> encoding due to later <code>html_entity_decode()</code>.</li>
<li>An administrator logs into the WordPress dashboard and navigates to the &ldquo;Leads&rdquo; page to view form submissions.</li>
<li>The form-data.php template retrieves the stored malicious payload from the database.</li>
<li>The payload is outputted directly within the <code>href</code> attribute of an HTML element without proper escaping using <code>esc_url()</code>.</li>
<li>The injected JavaScript code executes within the administrator&rsquo;s browser, potentially performing actions such as stealing cookies or redirecting the administrator to a malicious site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in administrator&rsquo;s browser. This could lead to a full compromise of the WordPress site, including the ability to create new administrative accounts, modify existing content, inject malware into the site&rsquo;s pages, or steal sensitive data. The impact is significant, as it requires no user interaction beyond an administrator viewing the form submissions within the Brizy plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Brizy – Page Builder plugin to the latest version to patch CVE-2026-5324.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brizy WordPress Plugin XSS Attempt via HTTP Request&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review the <code>form-data.php</code> template and implement proper output escaping using <code>esc_url()</code> for all user-supplied data to prevent XSS, as mentioned in the vulnerability description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>unauthenticated</category></item></channel></rss>