Home

Description

The MW WP Form plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 5.1.2 via the _get_post_property_from_querystring() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.

PUBLISHED Reserved 2026-04-13 | Published 2026-05-14 | Updated 2026-05-14 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-10:Discovered
2026-04-13:Vendor Notified
2026-05-13:Disclosed

Credits

Kirasec finder

References

www.wordfence.com/...-3d37-4765-99e8-023610856b61?source=cve

github.com/...ommit/77aed98f56fdddc19bddf21c8f12faa5086d9202

plugins.trac.wordpress.org/changeset/3516013/mw-wp-form

cve.org (CVE-2026-6206)

nvd.nist.gov (CVE-2026-6206)

Download JSON