Description
The Seraphinite Accelerator plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.28.14 via the `seraph_accel_api` AJAX action with `fn=GetData`. This is due to the `OnAdminApi_GetData()` function not performing any capability checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive operational data including cache status, scheduled task information, and external database state.
Published: 2026-03-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Immediate Patch
AI Analysis

Impact

The Seraphinite Accelerator plugin for WordPress allows the seraph_accel_api AJAX action to return sensitive operational data. Because the OnAdminApi_GetData() function does not verify user capabilities, any authenticated user with the Subscriber role or higher may call the fn=GetData endpoint. Exposure includes cache status, scheduled task information, and external database state, potentially revealing valuable operational details. The weakness is a lack of access control and is reflected in CWE‑200.

Affected Systems

The plugin sent by Seraphinite Soft, Seraphinite Accelerator, is affected. Versions up to and including 2.28.14 on WordPress installations are vulnerable. Administrators should check the plugin version and update to a later release.

Risk and Exploitability

The CVSS base score is 4.3, placing the vulnerability in the medium range. Exploit probability, as measured by EPSS, is reported as less than 1 percent, and the issue is not listed in the CISA KEV catalog. Nonetheless, any user with Subscriber level credentials on a WordPress site can use the exposed AJAX endpoint to read operational data, giving an attacker insight into the system’s internals. Because the attack requires only authentication to the site, the attack vector is a legitimate user account, making the risk moderate but significant for environments where exposure of such data would be sensitive.

Generated by OpenCVE AI on April 15, 2026 at 16:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Seraphinite Accelerator to version 2.28.15 or newer
  • If upgrading is delayed, disable or restrict the seraph_accel_api AJAX endpoint so that only trusted users can access it
  • Ensure that only the necessary users have Subscriber or higher roles; remove or downgrade unnecessary accounts

Generated by OpenCVE AI on April 15, 2026 at 16:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared S-sols
S-sols seraphinite Accelerator
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*
Vendors & Products S-sols
S-sols seraphinite Accelerator

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Seraphinitesolutions
Seraphinitesolutions seraphinite Accelerator
Wordpress
Wordpress wordpress
Vendors & Products Seraphinitesolutions
Seraphinitesolutions seraphinite Accelerator
Wordpress
Wordpress wordpress

Wed, 04 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description The Seraphinite Accelerator plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.28.14 via the `seraph_accel_api` AJAX action with `fn=GetData`. This is due to the `OnAdminApi_GetData()` function not performing any capability checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive operational data including cache status, scheduled task information, and external database state.
Title Seraphinite Accelerator <= 2.28.14 - Authenticated (Subscriber+) Exposure of Sensitive Information to an Unauthorized Actor
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

S-sols Seraphinite Accelerator
Seraphinitesolutions Seraphinite Accelerator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:19:26.805Z

Reserved: 2026-02-23T18:06:28.405Z

Link: CVE-2026-3058

cve-icon Vulnrichment

Updated: 2026-03-04T14:58:53.317Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T12:16:03.373

Modified: 2026-03-31T18:37:28.273

Link: CVE-2026-3058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses