Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wp Front User Submit Wp Front User Submit guest Posting / Frontend Posting / Front Editor |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wp Front User Submit Wp Front User Submit guest Posting / Frontend Posting / Front Editor |
Wed, 11 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Wed, 11 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address. | |
| Title | WP Front User Submit < 5.0.6 - Unauthenticated Sensitive Information Exposure | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-03-11T13:41:58.644Z
Reserved: 2026-02-03T21:55:33.287Z
Link: CVE-2026-1867
Updated: 2026-03-11T13:40:17.511Z
Status : Deferred
Published: 2026-03-11T06:17:13.397
Modified: 2026-04-15T15:05:47.827
Link: CVE-2026-1867
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:37:47Z