Description
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add_option() function. This function reads 'option' and 'opt_value' from $_POST, then calls delete_option() followed by add_option() using these attacker-controlled values without any nonce verification, capability checks, or option name allowlist. This makes it possible for unauthenticated attackers to update arbitrary WordPress options, which can be leveraged for privilege escalation by enabling user registration and setting the default user role to administrator.
Published: 2026-04-16
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The Riaxe Product Customizer plugin for WordPress contains an unauthenticated AJAX endpoint that lets any website visitor call a function that executes delete_option and add_option on arbitrary option names supplied by the attacker. Because the code performs no nonce verification, capability checks, or option name allowlist, an unauthenticated attacker can change WordPress configuration options. By setting the default role for new users to administrator or enabling registration, an attacker can effectively elevate privileges and seize control of the site.

Affected Systems

The vulnerability affects the Imprintnext Riaxe Product Customizer WordPress plugin, versions 2.1.2 and earlier.

Risk and Exploitability

The CVSS base score of 9.8 indicates critical severity. With no EPSS data available, the exploit probability is uncertain, but the absence of authentication checks means the vulnerability is highly actionable in practice. An attacker only needs to send an unauthenticated HTTP POST to the 'install-imprint' AJAX action, which is widely available on any site running the affected plugin, making the attack straightforward and the risk of exploitation significant.

Generated by OpenCVE AI on April 16, 2026 at 08:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Riaxe Product Customizer plugin to a version newer than 2.1.2, where the exploit is patched. If an update is not possible, remove the plugin entirely to eliminate the attack surface.
  • Block unauthenticated requests to the /wp-admin/admin-ajax.php?&action=install-imprint endpoint, for example by using a web‑application firewall or access‑control rules that deny POST requests to this action from non‑authenticated users.
  • After applying the patch or removal, review site user roles and registration settings; disable user registration or set the default role to a non‑privileged role to reduce the chance of privilege escalation.

Generated by OpenCVE AI on April 16, 2026 at 08:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Imprintnext
Imprintnext riaxe Product Customizer
Wordpress
Wordpress wordpress
Vendors & Products Imprintnext
Imprintnext riaxe Product Customizer
Wordpress
Wordpress wordpress

Thu, 16 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add_option() function. This function reads 'option' and 'opt_value' from $_POST, then calls delete_option() followed by add_option() using these attacker-controlled values without any nonce verification, capability checks, or option name allowlist. This makes it possible for unauthenticated attackers to update arbitrary WordPress options, which can be leveraged for privilege escalation by enabling user registration and setting the default user role to administrator.
Title Riaxe Product Customizer <= 2.1.2 - Missing Authorization to Unauthenticated Arbitrary Options Update to Privilege Escalation via 'install-imprint' AJAX Action
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Imprintnext Riaxe Product Customizer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-16T12:56:20.193Z

Reserved: 2026-03-05T13:22:13.502Z

Link: CVE-2026-3596

cve-icon Vulnrichment

Updated: 2026-04-16T12:56:15.330Z

cve-icon NVD

Status : Received

Published: 2026-04-16T06:16:15.667

Modified: 2026-04-16T06:16:15.667

Link: CVE-2026-3596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:11:51Z

Weaknesses