Home

Description

The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated Arbitrary Shortcode Execution in all versions up to and including 1.1.7. This is due to the handle_email_verification_page() function constructing a shortcode string from user-supplied GET parameters (token, email) and passing it to do_shortcode() without properly sanitizing square bracket characters, combined with missing authorization checks on the init hook. While sanitize_text_field() and esc_attr() are applied, neither function strips or escapes square bracket characters ([ and ]). WordPress's shortcode regex uses [^\]\/]* to match content inside shortcode tags, meaning a ] character in the token value prematurely closes the shortcode tag. This makes it possible for unauthenticated attackers to inject and execute arbitrary registered shortcodes by crafting a malicious token parameter containing ] followed by arbitrary shortcode syntax.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-19 | Updated 2026-04-08 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-03:Vendor Notified
2026-03-18:Disclosed

Credits

Youcef Hamdani finder

References

www.wordfence.com/...-9052-4dc9-94d0-3ec8de3d5460?source=cve

plugins.trac.wordpress.org/...-popup-subscription-public.php

plugins.trac.wordpress.org/...-popup-subscription-public.php

plugins.trac.wordpress.org/...-popup-subscription-public.php

plugins.trac.wordpress.org/...-popup-subscription-public.php

plugins.trac.wordpress.org/...-builder&sfp_email=&sfph_mail=

cve.org (CVE-2026-3475)

nvd.nist.gov (CVE-2026-3475)

Download JSON