Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Soflyy
Soflyy wp All Export – Drag & Drop Export To Any Custom Csv, Xml & Excel Wordpress Wordpress wordpress |
|
| Vendors & Products |
Soflyy
Soflyy wp All Export – Drag & Drop Export To Any Custom Csv, Xml & Excel Wordpress Wordpress wordpress |
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP All Export plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.14 via the export download endpoint. This is due to a PHP type juggling vulnerability in the security token comparison which uses loose comparison (==) instead of strict comparison (===). This makes it possible for unauthenticated attackers to bypass authentication using "magic hash" values when the expected MD5 hash prefix happens to be numeric-looking (matching pattern ^0e\d+$), allowing download of sensitive export files containing PII, business data, or database information. | |
| Title | WP All Export <= 1.4.14 - Unauthenticated Sensitive Information Exposure via PHP Type Juggling | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-18T20:23:34.008Z
Reserved: 2026-01-29T00:43:49.262Z
Link: CVE-2026-1582
Updated: 2026-02-18T20:23:26.609Z
Status : Awaiting Analysis
Published: 2026-02-18T13:16:20.340
Modified: 2026-02-18T17:51:53.510
Link: CVE-2026-1582
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:20:15Z