<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WordPress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/wordpress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 19:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/wordpress/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</link><pubDate>Mon, 04 May 2026 19:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-contact-form-7-resource-exhaustion/</guid><description>The Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.</description><content:encoded><![CDATA[<p>The Contact Form 7 WordPress plugin, specifically versions up to 2.6.7, contains an uncontrolled resource consumption vulnerability (CVE-2026-25863) within the <code>Wpcf7cfMailParser</code> class. The <code>hide_hidden_mail_fields_regex_callback()</code> method is susceptible to unbounded loop execution due to reading an iteration count directly from user-supplied POST parameters via the REST API endpoint without proper validation. This allows unauthenticated attackers to send a large integer value, triggering multiple <code>preg_replace()</code> operations, leading to server memory exhaustion and crashing the PHP process. This vulnerability enables a denial-of-service condition, potentially impacting all websites using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using Contact Form 7 plugin version 2.6.7 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress REST API endpoint.</li>
<li>The POST request includes a large integer value for the iteration count parameter, which is passed directly to the <code>hide_hidden_mail_fields_regex_callback()</code> method.</li>
<li>The <code>hide_hidden_mail_fields_regex_callback()</code> method, lacking input validation, reads the attacker-controlled integer.</li>
<li>The method initiates an unbounded loop, performing <code>preg_replace()</code> operations based on the attacker-supplied iteration count.</li>
<li>Each <code>preg_replace()</code> operation consumes server memory.</li>
<li>The excessive number of iterations rapidly exhausts available server memory.</li>
<li>The PHP process crashes due to memory exhaustion, resulting in a denial-of-service condition for the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition. Attackers can crash the PHP process on vulnerable WordPress websites by exhausting server memory. This can result in website downtime, impacting user experience and potentially leading to data loss or corruption. While the exact number of affected websites is unknown, the widespread use of Contact Form 7 makes this vulnerability a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Contact Form 7 WordPress plugin to a version greater than 2.6.7 to patch CVE-2026-25863.</li>
<li>Deploy the Sigma rule <code>Detect Contact Form 7 Uncontrolled Resource Consumption Attempt</code> to your SIEM to detect malicious POST requests targeting the WordPress REST API.</li>
<li>Monitor web server logs for abnormally large POST request sizes to the WordPress REST API endpoint, as this may indicate an attempted exploitation of CVE-2026-25863.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>resource-exhaustion</category><category>denial-of-service</category><category>cve-2026-25863</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item><item><title>NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</link><pubDate>Sun, 03 May 2026 06:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-nex-forms-xss/</guid><description>The NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The NEX-Forms – Ultimate Forms Plugin for WordPress, versions up to and including 9.1.11, is susceptible to a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5063). This flaw stems from inadequate input sanitization and output escaping within the <code>submit_nex_form()</code> function. Unauthenticated attackers can exploit this vulnerability by injecting malicious JavaScript code through POST parameter key names. Successful exploitation allows the attacker to execute arbitrary scripts in the context of a user&rsquo;s browser when they access a page containing the injected script, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability was reported to Wordfence and a patch has been released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP POST request to a WordPress page that utilizes the vulnerable NEX-Forms plugin.</li>
<li>The POST request includes specially crafted parameter key names designed to inject JavaScript code.</li>
<li>The <code>submit_nex_form()</code> function processes the POST request without properly sanitizing or escaping the malicious input.</li>
<li>The injected JavaScript code is stored in the WordPress database.</li>
<li>A legitimate user accesses a page where the form data, including the malicious script, is displayed.</li>
<li>The stored JavaScript code executes within the user&rsquo;s browser in the context of the WordPress page.</li>
<li>The attacker can then perform actions such as stealing cookies, redirecting the user, or modifying the page content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to inject arbitrary JavaScript code into pages using the NEX-Forms plugin. This can lead to various malicious outcomes, including user session hijacking, website defacement, or redirection to phishing sites. As the vulnerability is stored, every user who visits a page containing the malicious script will be affected until the vulnerability is patched and the malicious input is removed. The severity is rated as HIGH with a CVSS base score of 7.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the NEX-Forms – Ultimate Forms Plugin for WordPress to a version beyond 9.1.11 to patch CVE-2026-5063.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NEX-Forms POST Requests</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests containing potentially malicious JavaScript code in parameter names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-5063</category></item><item><title>WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</link><pubDate>Sat, 02 May 2026 14:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-wcfm-idor/</guid><description>The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.</description><content:encoded><![CDATA[<p>The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin, a popular WordPress plugin, is affected by an Insecure Direct Object Reference (IDOR) vulnerability. This flaw, present in versions up to and including 6.7.25, stems from a lack of proper validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function. An attacker with Vendor-level privileges or higher can exploit this vulnerability to delete any user account on the WordPress instance, including those with administrative rights. This can lead to complete compromise of the affected website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Vendor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>wcfm_delete_wcfm_customer</code> function.</li>
<li>The attacker includes the <code>customerid</code> parameter in the request, setting its value to the ID of the target user account they wish to delete.</li>
<li>Due to the missing validation on the <code>customerid</code> parameter, the application directly uses the provided ID to locate the user account.</li>
<li>The <code>wcfm_delete_wcfm_customer</code> function proceeds to delete the user account identified by the attacker-supplied <code>customerid</code>.</li>
<li>The targeted user account is successfully deleted from the WordPress instance.</li>
<li>If the deleted user account was an administrator, the attacker can effectively take control of the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this IDOR vulnerability allows an attacker to delete arbitrary user accounts, including those with administrative privileges. This can lead to a complete compromise of the affected WordPress website. An attacker could then deface the website, steal sensitive data, or use it to launch further attacks. Due to the popularity of the plugin, a large number of WooCommerce stores are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest available patch or upgrade to a version of the WCFM plugin greater than 6.7.25 to remediate CVE-2026-2554.</li>
<li>Monitor web server logs for suspicious requests to <code>wcfm_delete_wcfm_customer</code> with unusual <code>customerid</code> values, using the Sigma rule provided below.</li>
<li>Implement input validation on the <code>customerid</code> parameter within the <code>wcfm_delete_wcfm_customer</code> function to prevent arbitrary user deletion.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>wordpress</category><category>woocommerce</category><category>account-deletion</category></item><item><title>Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</guid><description>The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.</description><content:encoded><![CDATA[<p>The Salon Booking System – Free Version plugin for WordPress, versions up to and including 10.30.25, contains an arbitrary file read vulnerability. This flaw stems from the plugin&rsquo;s public booking flow, where it accepts attacker-controlled file-field values. These values are subsequently used as trusted paths when creating email attachments for booking confirmations. This allows an unauthenticated attacker to supply a path to any file accessible to the web server, triggering its inclusion as an attachment in the booking confirmation email, effectively enabling arbitrary file exfiltration. Exploitation requires no authentication and can be triggered remotely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker accesses the public booking form of a WordPress site running the vulnerable Salon Booking System plugin.</li>
<li>The attacker crafts a malicious request to the booking form, injecting a file path (e.g., <code>/etc/passwd</code>) into a file-field parameter.</li>
<li>The plugin processes the booking request and stores the attacker-supplied file path.</li>
<li>The plugin generates a booking confirmation email.</li>
<li>The plugin uses the stored, attacker-controlled file path to attach the specified file to the confirmation email.</li>
<li>The booking confirmation email, now containing the arbitrary file as an attachment, is sent to the user who initiated the booking (which could be the attacker or an unwitting third party).</li>
<li>The attacker retrieves the email (if sent to the attacker) or intercepts it (if sent to a third party) and extracts the attached file.</li>
<li>The attacker gains unauthorized access to the contents of the exfiltrated file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files from the affected WordPress server. This could lead to the disclosure of sensitive information, such as configuration files, database credentials, or other confidential data. The vulnerability affects versions of the Salon Booking System plugin up to and including 10.30.25. The number of affected WordPress installations is unknown, but could be substantial given the plugin&rsquo;s popularity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Salon Booking System plugin to the latest version to patch CVE-2026-6320.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing absolute or relative file paths in file-field parameters, using a detection rule similar to the ones provided below.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, especially file paths.</li>
<li>Review and restrict file system permissions to limit the files accessible to the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>wordpress</category><category>plugin-vulnerability</category><category>cve</category></item><item><title>Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pmpro-stripe-webhook-vuln/</guid><description>The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.</description><content:encoded><![CDATA[<p>The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site&rsquo;s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wp_ajax_pmpro_stripe_create_webhook</code> endpoint.</li>
<li>Alternatively, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_delete_webhook</code> endpoint.</li>
<li>Or, the attacker crafts a malicious AJAX request to the <code>wp_ajax_pmpro_stripe_rebuild_webhook</code> endpoint.</li>
<li>Due to missing capability checks, the server processes the request without proper authorization.</li>
<li>The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker&rsquo;s request.</li>
<li>Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.</li>
<li>The attacker effectively disrupts the site&rsquo;s ability to collect payments and manage subscriptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site&rsquo;s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.</li>
<li>Monitor WordPress web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>pmpro_stripe_create_webhook</code>, <code>pmpro_stripe_delete_webhook</code>, or <code>pmpro_stripe_rebuild_webhook</code> using the &ldquo;Detect Suspicious PMPro Stripe Webhook AJAX Requests&rdquo; Sigma rule.</li>
<li>Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>stripe</category><category>webhook</category><category>vulnerability</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pys-ssrf/</guid><description>The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.</description><content:encoded><![CDATA[<p>CVE-2026-7049 is a server-side request forgery (SSRF) vulnerability found in the PixelYourSite Pro WordPress plugin. Specifically, all versions up to and including 12.5.0.1 are affected. This vulnerability allows unauthenticated attackers to send requests to arbitrary internal or external resources, as viewed from the web server. Although the fetched response bodies are not directly returned to the attacker (making it a blind SSRF), the application parses these responses internally, creating opportunities for reconnaissance and potentially for exploiting vulnerable internal services. Successful exploitation could expose sensitive information or allow unauthorized modification of internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>scan_video</code> parameter as an SSRF entry point.</li>
<li>The attacker crafts a malicious HTTP request targeting the WordPress server with the vulnerable PixelYourSite Pro plugin. The request includes the <code>scan_video</code> parameter set to a URL pointing to an internal resource (e.g., internal IP address or hostname).</li>
<li>The WordPress server receives the malicious request.</li>
<li>The PixelYourSite Pro plugin processes the request and initiates an HTTP request to the URL specified in the <code>scan_video</code> parameter.</li>
<li>The WordPress server makes a request to the internal resource.</li>
<li>The response from the internal resource is received by the WordPress server.</li>
<li>The PixelYourSite Pro plugin parses the response body, potentially revealing information about the internal service.</li>
<li>Depending on the targeted internal service and the attacker&rsquo;s crafted request, the attacker might be able to modify information or execute commands on the internal service, even though the response is not directly returned to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7049 allows an unauthenticated attacker to perform reconnaissance of internal network resources. The blind nature of the SSRF limits the attacker&rsquo;s immediate visibility into the response, but internal parsing of the response allows for potential information disclosure and exploitation of vulnerable internal services. The scope of the impact depends heavily on the configuration of the internal network and the services exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the PixelYourSite Pro plugin to a version greater than 12.5.0.1 to patch CVE-2026-7049.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PixelYourSite Pro SSRF Attempts</code> to monitor for exploitation attempts targeting the <code>scan_video</code> parameter.</li>
<li>Review and restrict internal network access to sensitive services to mitigate the potential impact of SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ssrf</category><category>wordpress</category><category>plugin</category></item><item><title>Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)</title><link>https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</link><pubDate>Sat, 02 May 2026 06:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a popular form builder, contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-5113. This flaw affects versions up to and including 2.10.0. The vulnerability stems from a flawed state validation mechanism combined with insufficient output escaping within the Consent field&rsquo;s hidden inputs. An unauthenticated attacker can exploit this by injecting malicious JavaScript code into form entries. This malicious code is then executed when an authenticated administrator accesses the Entries List page within the WordPress administration panel, potentially leading to account compromise or other malicious actions performed within the administrator&rsquo;s session. Successful exploitation allows attackers to execute arbitrary web scripts in the context of an administrator&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing XSS code within a Gravity Forms Consent field. The payload leverages HTML tags like <code>&lt;svg&gt;</code> that <code>wp_kses()</code> will strip.</li>
<li>The attacker submits the crafted form entry to the WordPress site.</li>
<li>The Gravity Forms plugin&rsquo;s state validation mechanism calculates two hashes: one for the raw input and another after sanitization via <code>wp_kses()</code>.</li>
<li>Due to the nature of the XSS payload, the <code>wp_kses()</code> function strips the <code>&lt;svg&gt;</code> tag, resulting in a matching hash for the sanitized input.</li>
<li>The flawed validation logic fails to detect the malicious intent because at least one hash matches the original state, allowing the malicious raw value (containing the XSS payload) to be stored in the database.</li>
<li>An authenticated administrator logs into the WordPress administration panel.</li>
<li>The administrator navigates to the Entries List page for the affected Gravity Form.</li>
<li>The stored malicious consent label is retrieved from the database and output without proper escaping, causing the XSS payload to execute within the administrator&rsquo;s browser session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5113 allows unauthenticated attackers to execute arbitrary web scripts within the context of an authenticated administrator&rsquo;s browser session. This can lead to a variety of malicious outcomes, including account compromise, data theft, modification of website content, or further propagation of the attack to other administrative users. The severity of the impact depends on the privileges held by the compromised administrator account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to the latest version, which includes a fix for CVE-2026-5113.</li>
<li>Implement a Web Application Firewall (WAF) rule to filter out requests containing potentially malicious XSS payloads targeting the Gravity Forms Consent field.</li>
<li>Monitor web server logs for suspicious activity related to form submissions containing encoded or obfuscated JavaScript code. Analyze HTTP request parameters for unusual characters or patterns indicative of XSS attempts.</li>
<li>Enable output escaping on form entries to prevent stored XSS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category><category>cve-2026-5113</category><category>stored-xss</category></item><item><title>WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wp-mail-gateway-privesc/</guid><description>The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.</description><content:encoded><![CDATA[<p>The WP Mail Gateway plugin, a WordPress extension, contains a vulnerability (CVE-2026-6963) that allows authenticated users with minimal privileges (Subscriber level or higher) to gain administrative access. The flaw resides in the <code>wmg_save_provider_config</code> AJAX action, which lacks proper authorization checks. This omission enables attackers to manipulate SMTP settings, redirect outgoing emails, and ultimately trigger password reset emails intended for administrators. The vulnerability affects all versions of the WP Mail Gateway plugin up to and including version 1.8. Successful exploitation grants attackers complete control over the WordPress site, making it a critical security concern for any organization using the vulnerable plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs into a WordPress site with a Subscriber-level account or higher.</li>
<li>The attacker crafts a malicious AJAX request targeting the <code>wmg_save_provider_config</code> action.</li>
<li>This request modifies the SMTP settings, redirecting outgoing emails to an attacker-controlled server.</li>
<li>The attacker initiates a password reset request for an administrator account.</li>
<li>The password reset email is intercepted by the attacker&rsquo;s server.</li>
<li>The attacker uses the password reset link to gain access to the administrator&rsquo;s account.</li>
<li>The attacker logs into the WordPress dashboard with administrator privileges.</li>
<li>The attacker can now perform any administrative action, including installing malicious plugins, modifying site content, or creating new administrator accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6963 allows an attacker to completely compromise a WordPress website.  Even low-privileged users can elevate their access to administrator, giving them full control over the site.  This can lead to data breaches, website defacement, malware deployment, and other malicious activities. The vulnerability affects all installations of the WP Mail Gateway plugin up to version 1.8, potentially impacting thousands of WordPress sites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Mail Gateway plugin to a version beyond 1.8 to patch CVE-2026-6963.</li>
<li>Monitor WordPress logs for suspicious AJAX requests targeting the <code>wmg_save_provider_config</code> action using the Sigma rule provided below. Enable webserver logging to capture HTTP POST requests.</li>
<li>Implement the provided Sigma rule to detect modifications to WordPress options related to SMTP configuration. Enable relevant logging for registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>plugin-vulnerability</category></item><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>WP Editor Plugin CSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</link><pubDate>Fri, 01 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-editor-csrf/</guid><description>The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.</description><content:encoded><![CDATA[<p>The WP Editor plugin, a WordPress plugin, contains a Cross-Site Request Forgery (CSRF) vulnerability affecting versions up to and including 1.2.9.2. This vulnerability stems from a lack of nonce verification in the &lsquo;add_plugins_page&rsquo; and &lsquo;add_themes_page&rsquo; functions. An unauthenticated attacker can exploit this vulnerability by crafting a malicious request designed to overwrite arbitrary plugin and theme PHP files with attacker-controlled code. The success of this attack hinges on the attacker&rsquo;s ability to deceive a site administrator into triggering the forged request, typically by clicking a specially crafted link. This flaw allows for potential arbitrary code execution on the targeted WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WordPress site running a WP Editor plugin version &lt;= 1.2.9.2.</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;add_plugins_page&rsquo; or &lsquo;add_themes_page&rsquo; functions. This request includes parameters designed to overwrite a specific plugin or theme PHP file with attacker-supplied code.</li>
<li>The attacker social engineers a WordPress administrator into clicking a malicious link or visiting a compromised website containing the forged request. This could be achieved via phishing emails or other deceptive techniques.</li>
<li>If the administrator is logged into the WordPress dashboard, their browser automatically sends the forged request to the vulnerable WordPress site.</li>
<li>Due to the missing nonce verification, the WordPress site processes the request without validating its origin.</li>
<li>The target plugin or theme PHP file is overwritten with the attacker&rsquo;s malicious code.</li>
<li>The attacker&rsquo;s code is executed when the plugin or theme is loaded or accessed.</li>
<li>The attacker achieves arbitrary code execution on the WordPress server, potentially leading to complete site compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSRF vulnerability allows an unauthenticated attacker to inject arbitrary PHP code into a WordPress website. This can lead to a full compromise of the website, including data theft, defacement, or the installation of backdoors for persistent access. Given the widespread use of WordPress and the WP Editor plugin, a large number of websites are potentially at risk. Successful attacks can result in significant reputational damage and financial losses for affected website owners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Editor plugin to the latest available version, which includes a fix for CVE-2026-3772.</li>
<li>Implement strong CSRF protection measures on all WordPress forms and administrative functions.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this vulnerability through suspicious requests to the <code>add_plugins_page</code> or <code>add_themes_page</code> endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csrf</category><category>wordpress</category><category>plugin</category><category>vulnerability</category></item><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item><item><title>Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)</title><link>https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</link><pubDate>Mon, 24 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</guid><description>CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.</description><content:encoded><![CDATA[<p>The Otter Blocks plugin, a popular WordPress extension, is susceptible to a purchase verification bypass vulnerability identified as CVE-2026-2892. This flaw affects all versions up to and including 3.1.4. The vulnerability stems from the plugin&rsquo;s reliance on an unsigned cookie, &lsquo;o_stripe_data&rsquo;, to determine Stripe product ownership for unauthenticated users. The &lsquo;get_customer_data&rsquo; method uses this cookie, and the subsequent &lsquo;check_purchase&rsquo; method trusts its contents without proper server-side validation against the Stripe API. This lack of verification enables attackers to gain unauthorized access to purchase-gated content. The target product ID is often exposed in the checkout block&rsquo;s HTML source, further simplifying the exploit. Successful exploitation allows attackers to bypass payment requirements, potentially impacting content creators and businesses relying on the plugin for revenue generation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Otter Blocks plugin (version &lt;= 3.1.4).</li>
<li>The attacker examines the HTML source code of a checkout block on the target site to identify the target product ID.</li>
<li>The attacker crafts a malicious &lsquo;o_stripe_data&rsquo; cookie containing the target product ID.</li>
<li>The attacker sets the forged &lsquo;o_stripe_data&rsquo; cookie in their browser.</li>
<li>The attacker navigates to the purchase-gated content on the WordPress site.</li>
<li>The &lsquo;get_customer_data&rsquo; method reads the forged &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>The &lsquo;check_purchase&rsquo; method incorrectly validates the forged purchase data without server-side verification against the Stripe API.</li>
<li>The attacker gains unauthorized access to the purchase-gated content, bypassing the intended payment requirement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2892 allows unauthenticated attackers to bypass purchase verification mechanisms implemented by the Otter Blocks plugin. This can lead to unauthorized access to premium content, resulting in revenue loss for content creators and businesses using the plugin. The number of potentially affected websites is significant, given the popularity of WordPress and the Otter Blocks plugin. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Otter Blocks plugin to a version greater than 3.1.4 to patch CVE-2026-2892.</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts targeting the vulnerable plugin.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious cookie manipulation activity, specifically targeting the &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>Implement server-side validation of purchase data against the Stripe API to prevent cookie forgery attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>purchase-bypass</category><category>CVE-2026-2892</category><category>defense-evasion</category></item><item><title>Royal Elementor Addons Plugin SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin, a popular WordPress extension, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-6229) in versions up to and including 1.7.1057. This flaw stems from inadequate validation of user-provided URLs within the <code>render_csv_data()</code> function. Attackers can bypass the validation by including &lsquo;docs.google.com/spreadsheets&rsquo; in a query parameter. The vulnerability is triggered because the plugin uses these URLs in <code>fopen()</code> calls without implementing adequate safeguards to prevent access to internal or private network addresses. This vulnerability enables authenticated attackers with Contributor-level access or higher to craft malicious requests, potentially exposing sensitive internal data. Successful exploitation allows attackers to probe internal network resources, access configuration files, and potentially escalate attacks further.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Contributor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>render_csv_data()</code> function within the Royal Elementor Addons plugin.</li>
<li>The malicious request includes a user-supplied URL containing &lsquo;docs.google.com/spreadsheets&rsquo; within a query parameter to bypass initial validation checks.</li>
<li>The plugin&rsquo;s <code>render_csv_data()</code> function receives the crafted URL without proper sanitization or validation against internal or private network addresses.</li>
<li>The <code>fopen()</code> function is called with the attacker-controlled URL, initiating an outbound request from the WordPress server.</li>
<li>If the URL points to an internal resource, the WordPress server retrieves the resource content.</li>
<li>The attacker receives the content of the internal resource in the response from the WordPress server.</li>
<li>The attacker analyzes the retrieved content for sensitive information, such as configuration files, API keys, or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-6229) can lead to the exposure of sensitive internal information, potentially impacting all organizations using the Royal Elementor Addons plugin for WordPress version 1.7.1057 and below. This may include internal configuration files, API keys, database credentials, or other sensitive data accessible through internal services. The severity is high due to the potential for attackers to pivot from this vulnerability and further compromise the WordPress server or the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to a version higher than 1.7.1057 to patch CVE-2026-6229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Royal Elementor Addons SSRF Attempt via URL Parameter&rdquo; to identify malicious requests targeting the <code>render_csv_data()</code> function in your web server logs.</li>
<li>Implement strict network segmentation and firewall rules to limit access from the WordPress server to internal resources, mitigating the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>ssrf</category><category>cve-2026-6229</category><category>plugin</category></item><item><title>WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</guid><description>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.</description><content:encoded><![CDATA[<p>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress, in versions up to and including 1.1.3, contains an arbitrary file upload vulnerability tracked as CVE-2026-5364. The flaw stems from insufficient sanitization of file extensions during the upload process. Specifically, the plugin extracts the file extension before sanitization and allows the file type parameter to be controlled by the attacker. Furthermore, validation occurs on the unsanitized extension, while the file is saved with a sanitized extension, stripping special characters like &lsquo;$&rsquo; during the save. While an .htaccess file and name randomization are present, these restrictions may be bypassable in certain configurations or by exploiting other vulnerabilities. This vulnerability could allow unauthenticated attackers to upload arbitrary PHP files to the web server, potentially leading to remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.1.3) of the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the plugin&rsquo;s upload endpoint, typically <code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>.</li>
<li>The POST request includes a file with a manipulated extension, such as <code>evil.php$.jpg</code>, where <code>evil.php</code> is the malicious PHP payload and <code>$.jpg</code> is designed to be sanitized to <code>.jpg</code>.</li>
<li>The attacker modifies the <code>file type</code> parameter in the request to reflect the original manipulated file extension (<code>evil.php$.jpg</code>).</li>
<li>The plugin validates the extension against administrator-configured types but, due to the unsanitized extension and attacker control over the file type parameter, the malicious file passes validation.</li>
<li>The plugin sanitizes the extension, removing the <code>$</code> character, resulting in a file saved with the extension <code>.php</code>.</li>
<li>The attacker attempts to access the uploaded PHP file via a direct HTTP request to <code>/wp-content/uploads/&lt;random_name&gt;.php</code>.</li>
<li>If the <code>.htaccess</code> restrictions are bypassed (e.g., due to misconfiguration or another vulnerability), the web server executes the malicious PHP code, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5364 allows unauthenticated attackers to upload and execute arbitrary PHP code on the target WordPress server. This can lead to complete compromise of the website, including defacement, data theft, and installation of backdoors. While the presence of <code>.htaccess</code> and name randomization mitigates the risk, these protections may be bypassed, especially when combined with other vulnerabilities or misconfigurations. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to a large number of websites. The CVSS v3.1 base score is 8.1, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin to the latest version (greater than 1.1.3) to patch CVE-2026-5364.</li>
<li>Implement a Web Application Firewall (WAF) rule to inspect and block requests containing suspicious file extensions in the POST parameters targeting the plugin&rsquo;s upload endpoint (<code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious File Upload via Drag and Drop CF7</code> to identify exploitation attempts in web server logs (cs-uri-query).</li>
<li>Review and harden <code>.htaccess</code> configurations to ensure that PHP execution is restricted in the <code>/wp-content/uploads/</code> directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>plugin</category><category>CVE-2026-5364</category></item><item><title>WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</guid><description>An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The Profile Builder Pro plugin for WordPress is susceptible to a critical PHP Object Injection vulnerability (CVE-2026-7647) affecting all versions up to and including 3.14.5. This flaw stems from the plugin&rsquo;s use of the <code>maybe_unserialize()</code> function on the attacker-controlled <code>args</code> POST parameter passed to the <code>wppb_request_users_pins_action_callback()</code> AJAX handler. Critically, this handler lacks nonce verification, input validation, and type checking, making it accessible to unauthenticated users via both <code>wp_ajax_</code> and <code>wp_ajax_nopriv_</code> hooks. Successful exploitation allows remote, unauthenticated attackers to inject arbitrary PHP objects into the application&rsquo;s memory space, potentially leading to remote code execution depending on available classes and application configuration. The vulnerability was published on 2026-05-02.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 3.14.5) of the Profile Builder Pro plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress AJAX endpoint (<code>/wp-admin/admin-ajax.php</code>).</li>
<li>The POST request includes the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code>.</li>
<li>The POST request includes the <code>args</code> parameter containing a serialized PHP object designed to trigger arbitrary code execution upon deserialization.</li>
<li>The WordPress server receives the request and invokes the <code>wppb_request_users_pins_action_callback()</code> function.</li>
<li>The vulnerable function calls <code>maybe_unserialize()</code> on the attacker-controlled <code>args</code> parameter without proper sanitization or validation.</li>
<li>The malicious PHP object is deserialized and injected into the application&rsquo;s memory space.</li>
<li>The injected object&rsquo;s methods and properties are triggered, leading to arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary PHP code on the target WordPress server. This can lead to complete system compromise, including data theft, website defacement, and the installation of backdoors for persistent access. Given the widespread use of WordPress and the Profile Builder Pro plugin, a large number of websites are potentially at risk until the plugin is updated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Profile Builder Pro plugin to the latest available version to patch CVE-2026-7647.</li>
<li>Deploy the provided Sigma rule <code>Detect Profile Builder Pro PHP Object Injection Attempt</code> to detect exploitation attempts targeting the vulnerable AJAX endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code> and suspicious serialized data in the <code>args</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>php-object-injection</category><category>wordpress</category><category>plugin</category><category>rce</category></item><item><title>Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-gravity-forms-xss/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gravity-forms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to unauthenticated stored cross-site scripting (XSS) in versions up to 2.10.0, allowing attackers to inject arbitrary JavaScript code into the product name field within repeater fields, which executes when an administrator views the affected entry.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin, a widely used WordPress plugin, is susceptible to an unauthenticated stored cross-site scripting (XSS) vulnerability. This flaw, identified as CVE-2026-5110, affects versions up to and including 2.10.0. The vulnerability stems from inadequate input validation and output escaping specifically within the SingleProduct field when it is nested inside a Repeater field. This bypasses normal state validation, allowing attackers to inject malicious HTML and JavaScript into the product name field. The injected payload is then stored unsanitized in the database. This vulnerability allows unauthenticated attackers to inject arbitrary web scripts that execute whenever an administrator accesses an entry containing the malicious payload through the WordPress admin interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious request to a WordPress endpoint utilizing the Gravity Forms plugin.</li>
<li>The attacker injects arbitrary HTML and JavaScript into the &lsquo;product name&rsquo; field (input .1) of a SingleProduct field nested within a Repeater field.</li>
<li>Due to insufficient validation within the <code>validate_subfield()</code> method, the malicious input bypasses the state validation mechanism <code>(failed_state_validation())</code>.</li>
<li>The <code>sanitize_entry_value()</code> method returns the raw, unsanitized value because HTML is not expected for the affected field type.</li>
<li>The malicious input is stored in the WordPress database without proper sanitization or escaping.</li>
<li>An administrator accesses the Gravity Forms entries page in the WordPress admin interface (wp-admin/admin.php?page=gf_entries).</li>
<li>The <code>get_value_entry_detail()</code> method retrieves the malicious product name from the database and outputs it without proper escaping.</li>
<li>The stored XSS payload executes in the administrator&rsquo;s browser, potentially allowing the attacker to perform actions with the administrator&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of an administrator&rsquo;s browser session. This can lead to account compromise, data theft, or further malicious activities within the WordPress administration panel. The vulnerability affects all users of the Gravity Forms plugin on WordPress installations with versions up to and including 2.10.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to the latest version (greater than 2.10.0) to patch CVE-2026-5110.</li>
<li>Deploy the provided Sigma rule <code>Detect Gravity Forms XSS Attempt</code> to identify potential exploitation attempts by monitoring for specific patterns in HTTP requests.</li>
<li>Enable web server logging to capture detailed information about HTTP requests and responses, enabling the Sigma rule&rsquo;s effectiveness.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category></item><item><title>ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)</title><link>https://feed.craftedsignal.io/briefs/2024-01-armember-sqli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-armember-sqli/</guid><description>A time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (&lt;= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile &amp; User signup plugin for WordPress is susceptible to time-based blind SQL injection. This vulnerability, identified as CVE-2026-7649, affects all versions up to and including 4.0.60. The root cause lies in the inadequate escaping of the user-supplied &lsquo;orderby&rsquo; parameter and the lack of sufficient preparation in the existing SQL query. An unauthenticated attacker can exploit this weakness by injecting malicious SQL queries, potentially leading to the extraction of sensitive information directly from the WordPress database. This presents a significant risk, as it could expose user credentials, personal data, and other confidential information stored within the database, impacting the confidentiality and integrity of the WordPress installation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable ARMember plugin (version &lt;= 4.0.60).</li>
<li>The attacker crafts a malicious HTTP request targeting a page that uses the vulnerable &lsquo;orderby&rsquo; parameter.</li>
<li>The attacker injects SQL code into the &lsquo;orderby&rsquo; parameter of the HTTP GET or POST request. This code is designed to exploit the time-based blind SQL injection vulnerability.</li>
<li>The ARMember plugin processes the request without properly sanitizing the &lsquo;orderby&rsquo; parameter, allowing the injected SQL code to be executed within the database query.</li>
<li>The injected SQL code uses time-delay functions (e.g., <code>SLEEP()</code>) to determine the truthiness of conditions. Based on the response time, the attacker infers whether the injected SQL code is evaluating to true or false.</li>
<li>The attacker iteratively refines the injected SQL code to extract sensitive data, such as table names, column names, and data values, character by character, through observing the time delays.</li>
<li>The attacker dumps sensitive information from the database.</li>
<li>The attacker uses the extracted credentials to gain administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. This includes user credentials (usernames, email addresses, and password hashes), personal data, and potentially other confidential information stored within the database. The impact could range from unauthorized access to user accounts to complete compromise of the WordPress site and its underlying data. The number of affected sites depends on the prevalence of the ARMember plugin, but given its popularity, the potential impact is widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches provided by the ARMember plugin developers immediately to remediate CVE-2026-7649 on all WordPress installations using the plugin.</li>
<li>Deploy the Sigma rule &ldquo;Detect ARMember SQL Injection Attempt via Orderby Parameter&rdquo; to your SIEM to detect exploitation attempts against this vulnerability.</li>
<li>Monitor web server logs for suspicious requests containing SQL syntax in the &lsquo;orderby&rsquo; parameter to identify potential exploitation attempts (log source: webserver).</li>
<li>Implement and enforce strict input validation and sanitization for all user-supplied parameters, especially those used in database queries, to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>armember</category><category>cve-2026-7649</category></item><item><title>Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gravityforms-xss/</guid><description>The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.</description><content:encoded><![CDATA[<p>The Gravity Forms plugin for WordPress, a widely used form management tool, contains a vulnerability that can be exploited by unauthenticated attackers. Specifically, versions up to and including 2.10.0 are susceptible to Stored Cross-Site Scripting (XSS) due to insufficient input validation and output escaping of Calculation Product field names within Repeater fields. This flaw resides in how the plugin processes and renders form submissions containing malicious HTML within the product name field. The vulnerability allows an attacker to inject arbitrary web scripts that execute in the context of an authenticated administrator&rsquo;s session when they access the entry detail page within the WordPress admin panel. Successful exploitation enables attackers to perform actions with the privileges of the compromised administrator.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious form submission.</li>
<li>The malicious payload is placed in the Calculation Product field&rsquo;s product name (.1) within a Repeater field.</li>
<li>The <code>validate()</code> method in the <code>GF_Field_Calculation</code> class inadequately validates the product name field, failing to sanitize malicious HTML.</li>
<li>The <code>sanitize_entry_value()</code> method returns the raw, unsanitized value for the product name field, as HTML sanitization is not expected for this field.</li>
<li>The malicious form submission is saved as an entry in WordPress.</li>
<li>An authenticated administrator with the <code>gravityforms_view_entries</code> capability accesses the entry detail page in <code>wp-admin</code>.</li>
<li>The <code>get_value_entry_detail()</code> method concatenates the unsanitized product name directly into the output string.</li>
<li>The repeater&rsquo;s <code>get_value_entry_detail()</code> method renders the unsanitized output, leading to the execution of the injected XSS payload within the administrator&rsquo;s browser.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to execute arbitrary JavaScript code within the context of an authenticated WordPress administrator&rsquo;s session. This can lead to account takeover, data theft, or further malicious actions performed on the WordPress site. While the number of potentially affected sites is large due to the plugin&rsquo;s popularity, the impact is limited to administrators who access the specific entry containing the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Forms plugin to a version greater than 2.10.0 to patch CVE-2026-5112.</li>
<li>Implement the Sigma rule <code>Detect Gravity Forms XSS via Product Name</code> to detect attempts to inject malicious scripts into product names.</li>
<li>Review and audit existing Gravity Forms entries for suspicious content in Calculation Product fields to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>gravityforms</category></item><item><title>ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</guid><description>The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5464, exists in the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin, affecting all versions up to and including 9.1.2. The vulnerability allows authenticated attackers with Editor-level access or higher, who also possess the &rsquo;exactmetrics_view_dashboard&rsquo; capability, to install and activate arbitrary WordPress plugins from attacker-controlled URLs. This is possible due to the exposure of the &lsquo;onboarding_key&rsquo; transient and the lack of proper authorization checks on the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Successful exploitation can lead to Remote Code Execution (RCE) on the target WordPress site. This poses a significant risk to websites using the vulnerable plugin, as attackers can inject malicious code and gain full control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site as an Editor or Administrator.</li>
<li>The attacker obtains the &lsquo;onboarding_key&rsquo; by accessing the reports page, which exposes the transient value to users with the &rsquo;exactmetrics_view_dashboard&rsquo; capability.</li>
<li>The attacker uses the &lsquo;onboarding_key&rsquo; to access the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint, receiving a one-time hash (OTH) token.</li>
<li>The attacker crafts a malicious plugin ZIP file hosted on an attacker-controlled server.</li>
<li>The attacker sends a request to the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint, providing the OTH token and the URL of the malicious plugin ZIP file via the &lsquo;file&rsquo; parameter. This endpoint lacks capability checks and nonce verification.</li>
<li>The ExactMetrics plugin downloads the malicious plugin ZIP file from the attacker-controlled URL.</li>
<li>The ExactMetrics plugin installs and activates the malicious plugin.</li>
<li>The attacker gains Remote Code Execution on the WordPress server through the installed malicious plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5464 allows attackers to install arbitrary plugins on vulnerable WordPress sites, leading to Remote Code Execution. This grants the attacker complete control over the compromised website, enabling them to inject malicious code, deface the site, steal sensitive data, or use the site for further malicious activities. The number of affected websites depends on the widespread use of the ExactMetrics plugin. Organizations using this plugin are at risk of significant data breaches and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin to the latest version, which patches CVE-2026-5464.</li>
<li>Monitor web server logs for suspicious requests to the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint and the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Implement the Sigma rule provided below to detect exploitation attempts.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to WordPress accounts.</li>
<li>Restrict the &rsquo;exactmetrics_view_dashboard&rsquo; capability to only the necessary users.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>rce</category><category>cve-2026-5464</category><category>exactmetrics</category></item><item><title>Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</guid><description>The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.</description><content:encoded><![CDATA[<p>The Brizy – Page Builder plugin for WordPress, a popular tool for designing website pages, contains a critical vulnerability that allows unauthenticated users to inject malicious JavaScript code. Specifically, versions up to and including 2.8.11 are affected. This vulnerability arises from a combination of factors, including the lack of nonce verification for form submissions from non-logged-in users, inadequate handling of FileUpload fields when no file is actually uploaded, and the unintended reversal of security encoding through <code>html_entity_decode()</code> before outputting data. This allows attackers to inject arbitrary web scripts that execute in the context of a logged-in administrator viewing the form&rsquo;s &ldquo;Leads&rdquo; page, potentially leading to account takeover, data theft, or further compromise of the WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing JavaScript code.</li>
<li>The attacker submits this payload through a Brizy form on the WordPress site, exploiting the missing nonce verification in the <code>submit_form()</code> function.</li>
<li>The <code>handleFileTypeFields()</code> function fails to properly sanitize or overwrite the attacker-supplied values when no file is attached to the form submission.</li>
<li>The injected payload, now stored in the WordPress database, bypasses initial <code>htmlentities()</code> encoding due to later <code>html_entity_decode()</code>.</li>
<li>An administrator logs into the WordPress dashboard and navigates to the &ldquo;Leads&rdquo; page to view form submissions.</li>
<li>The form-data.php template retrieves the stored malicious payload from the database.</li>
<li>The payload is outputted directly within the <code>href</code> attribute of an HTML element without proper escaping using <code>esc_url()</code>.</li>
<li>The injected JavaScript code executes within the administrator&rsquo;s browser, potentially performing actions such as stealing cookies or redirecting the administrator to a malicious site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in administrator&rsquo;s browser. This could lead to a full compromise of the WordPress site, including the ability to create new administrative accounts, modify existing content, inject malware into the site&rsquo;s pages, or steal sensitive data. The impact is significant, as it requires no user interaction beyond an administrator viewing the form submissions within the Brizy plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Brizy – Page Builder plugin to the latest version to patch CVE-2026-5324.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brizy WordPress Plugin XSS Attempt via HTTP Request&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review the <code>form-data.php</code> template and implement proper output escaping using <code>esc_url()</code> for all user-supplied data to prevent XSS, as mentioned in the vulnerability description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>unauthenticated</category></item></channel></rss>