Description
The NotificationX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'regenerate' and 'reset' REST API endpoints in all versions up to, and including, 3.1.11. This makes it possible for authenticated attackers, with Contributor-level access and above, to reset analytics for any NotificationX campaign, regardless of ownership.
Published: 2026-01-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized analytics reset by authenticated users with Contributor-level access
Action: Check Update
AI Analysis

Impact

The NotificationX plugin for WordPress contains a missing capability check on the REST API endpoints used for regenerating and resetting campaign analytics. Because of this omission, authenticated users who hold Contributor privileges or higher can trigger a reset of the analytics for any NotificationX campaign, even if the user does not own that campaign. This allows the attacker to modify data, potentially erasing valuable tracking information and undermining the accuracy of campaign metrics, while preserving confidentiality and integrity of other site data.

Affected Systems

The plugin affected is NotificationX, including variants such as FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner, and Floating Notification Bar from wpdevteam. Versions up to and including 3.1.11 are vulnerable; these releases are available for WordPress sites that have installed the plugin. No specific operating system or WordPress version is singled out beyond the plugin version.

Risk and Exploitability

This issue has a CVSS base score of 4.3, reflecting moderate severity because only analytics data can be altered. The EPSS score is below 1%, indicating a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, so there is no evidence of widespread exploitation yet. Nevertheless, attackers who can reach a WordPress site with Contributor or higher roles could trigger the reset via the exposed REST endpoints once the missing capability check is bypassed. No additional preconditions beyond authenticated access are required, and the affected functionality is reachable through normal REST routes.

Generated by OpenCVE AI on April 16, 2026 at 02:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the installed NotificationX plugin version and check the vendor’s website or plugin repository for an official update that addresses the missing authorization check.
  • If an update is not immediately available, remove or limit the REST API permissions for Contributor roles, ensuring that only administrators can access the analytics reset endpoints.
  • Monitor the plugin and WordPress environment for new releases or security advisories and apply updates promptly.

Generated by OpenCVE AI on April 16, 2026 at 02:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description The NotificationX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'regenerate' and 'reset' REST API endpoints in all versions up to, and including, 3.1.11. This makes it possible for authenticated attackers, with Contributor-level access and above, to reset analytics for any NotificationX campaign, regardless of ownership.
Title NotificationX <= 3.1.11 - Missing Authorization to Authenticated (Contributor+) Analytics Reset
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:28.505Z

Reserved: 2026-01-01T20:31:15.582Z

Link: CVE-2026-0554

cve-icon Vulnrichment

Updated: 2026-01-20T14:46:58.726Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T15:20:06.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses