Description
The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.
Published: 2026-03-11
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Patch
AI Analysis

Impact

The Guest posting / Frontend Posting / Front Editor WordPress plugin, in releases before 5.0.6, allows an external user to supply a URL parameter that triggers regeneration of a .json file from demo data. When an administrator has altered the demo form and enabled admin notifications, the resulting JSON contains all form input and configuration, including the administrator’s email address. This is a classic disclosure of confidential data with the weakness described as CWE‑200. No authentication is required for the attacker to obtain the data.

Affected Systems

Any WordPress installation that has the Guest posting / Frontend Posting / Front Editor plugin installed in a version earlier than 5.0.6 is vulnerable. The CVE notes that the issue exists in all releases up to and including 5.0.5; no explicit patch version is listed in the provided data.

Risk and Exploitability

The CVSS base score of 5.9 indicates medium severity, while the EPSS score of less than 1% suggests a low likelihood of active exploitation in the wild. The vulnerability is not present in the CISA KEV catalog, implying no known widespread exploitation. An attacker only needs to craft a URL to the plugin endpoint; no credentials or privileged access are required, making exploitation straightforward from any network that can reach the site’s public interface.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Guest posting / Frontend Posting / Front Editor plugin to version 5.0.6 or newer.
  • If an immediate update is not feasible, disable admin notifications in the plugin settings to prevent sensitive data from being included in the exported .json file.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp Front User Submit
Wp Front User Submit guest Posting / Frontend Posting / Front Editor
Vendors & Products Wordpress
Wordpress wordpress
Wp Front User Submit
Wp Front User Submit guest Posting / Frontend Posting / Front Editor

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 11 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.
Title WP Front User Submit < 5.0.6 - Unauthenticated Sensitive Information Exposure
References

Subscriptions

Wordpress Wordpress
Wp Front User Submit Guest Posting / Frontend Posting / Front Editor
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-11T13:41:58.644Z

Reserved: 2026-02-03T21:55:33.287Z

Link: CVE-2026-1867

cve-icon Vulnrichment

Updated: 2026-03-11T13:40:17.511Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T06:17:13.397

Modified: 2026-03-11T14:16:17.450

Link: CVE-2026-1867

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:47Z

Weaknesses