Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Export All Urls
Export All Urls export All Urls Wordpress Wordpress wordpress |
|
| Vendors & Products |
Export All Urls
Export All Urls export All Urls Wordpress Wordpress wordpress |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Wed, 01 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Export All URLs WordPress plugin before 5.1 generates CSV filenames containing posts URLS (including private posts) in a predictable pattern using a random 6-digit number. These files are stored in the publicly accessible wp-content/uploads/ directory. As a result, any unauthenticated user can brute-force the filenames to gain access to sensitive data contained within the exported files. | |
| Title | Export All URLs < 5.1 - Unauthenticated Sensitive Data Exposure | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-04-01T14:02:38.139Z
Reserved: 2026-02-18T14:32:38.179Z
Link: CVE-2026-2696
Updated: 2026-04-01T14:02:34.765Z
Status : Deferred
Published: 2026-04-01T06:16:15.380
Modified: 2026-04-15T15:05:47.827
Link: CVE-2026-2696
No data.
OpenCVE Enrichment
Updated: 2026-04-03T08:58:46Z