Home

Description

The Broadstreet plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.52.2 via the get_sponsored_meta AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to disclose any private post metadata.

PUBLISHED Reserved 2026-02-04 | Published 2026-05-21 | Updated 2026-05-21 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-02-04:Vendor Notified
2026-05-20:Disclosed

Credits

Tarcísio Luchesi De Almeida Silva finder

References

www.wordfence.com/...-797b-4b1a-b0f1-afd8e44f41e6?source=cve

plugins.trac.wordpress.org/...ath=%2Fbroadstreet/tags/1.53.2

cve.org (CVE-2026-1881)

nvd.nist.gov (CVE-2026-1881)

Download JSON