Home

Description

The Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Alternative) plugin for WordPress is vulnerable to Authentication Bypass in versions 3.4.0 to 3.4.1.1. This is due to incorrect return-value handling in the `is_mainwp_authenticated()` function when validating application passwords from the Authorization header. This makes it possible for unauthenticated attackers, with knowledge of an administrator username, to impersonate that administrator for the duration of the request by supplying any random Basic Authentication password achieving privilege escalation.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-14 | Updated 2026-05-14 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-287 Improper Authentication

Product status

Default status
unaffected

3.4.0 (semver)
affected

Timeline

2026-05-11:Vendor Notified
2026-05-13:Disclosed

Credits

Chloe Chamberland finder

PRISM finder

References

www.wordfence.com/...-3d3c-4026-85cd-8447b8a568d3?source=cve

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/...rontend/class-mainwp-proxy.php

plugins.trac.wordpress.org/.../Traits/trait-admin-helper.php

plugins.trac.wordpress.org/.../Traits/trait-admin-helper.php

github.com/...9ea7c/includes/Frontend/class-mainwp-proxy.php

cve.org (CVE-2026-8181)

nvd.nist.gov (CVE-2026-8181)

Download JSON