Home

Description

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playlist ID via the audioigniter_playlist_id query var or the /audioigniter/playlist/{id}/ rewrite rule and returning playlist track data without performing any authentication, capability, or post_status check — only the post_type is validated. This makes it possible for unauthenticated attackers to view track metadata (titles, artists, audio URLs, buy links, download URLs, and cover images) of any playlist on the site, including those in draft, private, pending, or trash status.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-22 | Updated 2026-05-22 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-15:Vendor Notified
2026-05-21:Disclosed

Credits

nudien udin finder

alfito ardi pratama finder

References

www.wordfence.com/...-036e-4f6f-bcc1-5183bb9ad2b9?source=cve

plugins.trac.wordpress.org/...er/tags/2.0.2/audioigniter.php

plugins.trac.wordpress.org/...er/tags/2.0.2/audioigniter.php

plugins.trac.wordpress.org/...er/tags/2.0.2/audioigniter.php

github.com/...ommit/35a0508583c26c01b6ac446404ad6fe1d440d8d4

cve.org (CVE-2026-8679)

nvd.nist.gov (CVE-2026-8679)

Download JSON