Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roxnor
Roxnor getgenie – Ai Content Writer With Keyword Research & Seo Tracking Tools Wordpress Wordpress wordpress |
|
| Vendors & Products |
Roxnor
Roxnor getgenie – Ai Content Writer With Keyword Research & Seo Tracking Tools Wordpress Wordpress wordpress |
Fri, 13 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar. | |
| Title | GetGenie <= 4.3.2 - Insecure Direct Object Reference to Authenticated (Author+) Stored Cross-Site Scripting via REST API | |
| Weaknesses | CWE-639 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:35:43.740Z
Reserved: 2026-02-09T15:32:20.261Z
Link: CVE-2026-2257
Updated: 2026-03-13T16:05:15.280Z
Status : Deferred
Published: 2026-03-13T19:54:33.467
Modified: 2026-04-22T21:30:26.497
Link: CVE-2026-2257
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:59:41Z