Description
The WP Adminify plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.7.7 via the /wp-json/adminify/v1/get-addons-list REST API endpoint. The endpoint is registered with permission_callback set to __return_true, allowing unauthenticated attackers to retrieve the complete list of available addons, their installation status, version numbers, and download URLs.
Published: 2026-01-28
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Immediate Patch
AI Analysis

Impact

The WP Adminify plugin exposes sensitive information through an unauthenticated REST API endpoint. The /wp-json/adminify/v1/get-addons-list call returns a full list of available addons, including installation status, version numbers, and download URLs. The vulnerability arises because the endpoint’s permission callback is set to __return_true, meaning it bypasses any authentication checks and permits any external user to harvest plugin metadata without credentials.

Affected Systems

WordPress sites that have the WP Adminify plugin installed in any version up to and including 4.0.7.7. The plugin is distributed under the name "WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer" and is commonly used by site owners who want to customize the WordPress admin interface. Because the plugin is bundled with this name, administrators should verify the plugin version on their sites and consider any version that has not been patched to 4.0.8 or newer as vulnerable.

Risk and Exploitability

This vulnerability carries a CVSS score of 5.3, indicating moderate severity. EPSS indicates a very low exploitation probability (<1%), suggesting that attackers may not aggressively target this weakness, yet the lack of authentication still allows malicious actors to enumerate plugin capabilities. The vulnerability is not currently listed in the CISA KEV catalog. Attackers could leverage the exposed information to identify potentially outdated addons, download URLs, or plan further exploitation of the WordPress environment, especially if other misconfigurations exist. No specific environmental prerequisites are mentioned, so an unauthenticated attacker with network access to the WordPress REST API can exploit it.

Generated by OpenCVE AI on April 15, 2026 at 18:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Adminify to version 4.0.8 or later, which removes the insecure permission callback.
  • If an immediate update is not possible, restrict access to the /wp-json/adminify/v1/get-addons-list endpoint via a firewall rule, .htaccess restriction, or a security plugin that blocks unauthenticated REST calls to that URI.
  • Implement a custom permission callback or modify the plugin’s code to require authentication for the REST endpoint, ensuring only authorized users can retrieve addon information.

Generated by OpenCVE AI on April 15, 2026 at 18:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description The WP Adminify plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.7.7 via the /wp-json/adminify/v1/get-addons-list REST API endpoint. The endpoint is registered with permission_callback set to __return_true, allowing unauthenticated attackers to retrieve the complete list of available addons, their installation status, version numbers, and download URLs.
Title WP Adminify <= 4.0.7.7 - Unauthenticated Sensitive Information Exposure via 'get-addons-list' REST API
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:16.014Z

Reserved: 2026-01-16T19:04:24.186Z

Link: CVE-2026-1060

cve-icon Vulnrichment

Updated: 2026-01-28T14:42:00.122Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T15:16:16.200

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:00:12Z

Weaknesses