Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Soflyy
Soflyy wp All Export – Drag & Drop Export To Any Custom Csv, Xml & Excel Wordpress Wordpress wordpress |
|
| Vendors & Products |
Soflyy
Soflyy wp All Export – Drag & Drop Export To Any Custom Csv, Xml & Excel Wordpress Wordpress wordpress |
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP All Export plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.14 via the export download endpoint. This is due to a PHP type juggling vulnerability in the security token comparison which uses loose comparison (==) instead of strict comparison (===). This makes it possible for unauthenticated attackers to bypass authentication using "magic hash" values when the expected MD5 hash prefix happens to be numeric-looking (matching pattern ^0e\d+$), allowing download of sensitive export files containing PII, business data, or database information. | |
| Title | WP All Export <= 1.4.14 - Unauthenticated Sensitive Information Exposure via PHP Type Juggling | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:11:05.713Z
Reserved: 2026-01-29T00:43:49.262Z
Link: CVE-2026-1582
Updated: 2026-02-18T20:23:26.609Z
Status : Deferred
Published: 2026-02-18T13:16:20.340
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-1582
No data.
OpenCVE Enrichment
Updated: 2026-04-15T18:15:10Z