Description
The HUMN-1 AI Website Scanner & Human Certification by Winston AI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the winston_disconnect() function in all versions up to, and including, 0.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's API connection settings via the 'winston_disconnect' AJAX action.
Published: 2026-03-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized reset of plugin connection settings
Action: Update Plugin
AI Analysis

Impact

The HUMN-1 AI Website Scanner & Human Certification plugin for WordPress lacks a capability check in the winston_disconnect() function, allowing any authenticated user with Subscriber or higher privileges to trigger the 'winston_disconnect' AJAX action and reset the plugin's API connection settings. This changes critical configuration data, effectively disrupting the plugin’s operation and potentially disabling site monitoring or certification services. The flaw does not allow generic code execution, but it compromises the integrity and availability of the plugin’s functionality.

Affected Systems

WordPress sites that have installed the Winston AI HUMN-1 AI Website Scanner & Human Certification plugin in versions 0.0.3 or earlier. The issue targets any installation of the plugin regardless of other WordPress components, and applies to any user account that holds at least Subscriber privileges.

Risk and Exploitability

With a CVSS score of 4.3, the vulnerability is classified as moderate severity. The EPSS score is reported as less than 1%, indicating a low probability that the flaw will be actively exploited in the wild at this time. The vulnerability is not currently listed in the CISA KEV catalog. Attackers must be authenticated and possess Subscriber or higher role access to the WordPress site. The exploit path requires the ability to send an AJAX request to the winston_disconnect endpoint, a functionality exposed by the plugin. Given these conditions, the risk is limited to sites with legitimate subscriber users and no privilege‑elevation mechanism beyond the normal WordPress role hierarchy.

Generated by OpenCVE AI on April 15, 2026 at 16:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest plugin version that implements the missing capability check for the winston_disconnect action.
  • Restrict or remove Subscriber‑level accounts from WordPress admin or from accessing the plugin’s AJAX endpoints, if possible, to reduce the attack surface.
  • As a temporary workaround, edit the plugin’s Ajax_Admin.php file to add a capability check such as current_user_can('manage_options') before executing winston_disconnect, or disable the endpoint entirely for non‑admin users.

Generated by OpenCVE AI on April 15, 2026 at 16:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Winstonai
Winstonai humn-1 Ai Website Scanner & Human Certification By Winston Ai
Wordpress
Wordpress wordpress
Vendors & Products Winstonai
Winstonai humn-1 Ai Website Scanner & Human Certification By Winston Ai
Wordpress
Wordpress wordpress

Fri, 06 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description The HUMN-1 AI Website Scanner & Human Certification by Winston AI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the winston_disconnect() function in all versions up to, and including, 0.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's API connection settings via the 'winston_disconnect' AJAX action.
Title Winston AI <= 0.0.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Settings Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Winstonai Humn-1 Ai Website Scanner & Human Certification By Winston Ai
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:16.853Z

Reserved: 2026-02-05T14:23:11.148Z

Link: CVE-2026-1981

cve-icon Vulnrichment

Updated: 2026-03-09T19:00:29.305Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T00:16:13.280

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-1981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses