Description
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.
Problem types
Product status
Any version
Timeline
| 2026-02-03: | Vendor Notified |
| 2026-04-08: | Disclosed |
Credits
Athiwat Tiprasaharn
Itthidej Aramsri
Vilaysone CHANTHAVONG
Waris Damkham
References
www.wordfence.com/...-a477-4bc6-a392-ad5a9eca1cb5?source=cve
plugins.trac.wordpress.org/...quick-playground/trunk/api.php
plugins.trac.wordpress.org/...playground/trunk/expro-api.php
plugins.trac.wordpress.org/...ayground&sfp_email=&sfph_mail=