Home

Description

The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.

PUBLISHED Reserved 2026-02-03 | Published 2026-03-11 | Updated 2026-03-11 | Assigner WPScan

Problem types

CWE-200 Information Exposure

Product status

Default status
unaffected

Any version before 5.0.6
affected

Credits

Mike Gozdiskowski finder

WPScan coordinator

References

wpscan.com/...rability/a78ebcd2-9355-4f4e-829e-b10867463576/ exploit vdb-entry technical-description

cve.org (CVE-2026-1867)

nvd.nist.gov (CVE-2026-1867)

Download JSON