Description
The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated disclosure of private WordPress content
Action: Immediate Patch
AI Analysis

Impact

The ActivityPub WordPress plugin by Automattic incorrectly routes content, allowing unauthenticated visitors to view posts marked as draft, scheduled or pending. This flaw results in the disclosure of unpublished content without credentials, violating confidentiality of private WordPress posts. The plugin’s lack of proper authentication checks during route handling is the root cause.

Affected Systems

This vulnerability impacts the ActivityPub plugin for WordPress distributed by Automattic, installed on any WordPress site using a version earlier than 8.0.2. The affected environment includes WordPress installations that rely on the plugin for activity feed and routing operations.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity for this information disclosure flaw. The EPSS score is below 1%, suggesting a low likelihood of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires only an unauthenticated web request to the plugin’s routing endpoints, meaning any Internet‑connected user who can reach the WordPress instance can trigger the disclosure. No additional authentication or privilege escalation is necessary. The likely attack vector is unauthenticated HTTP requests directed to the plugin’s routes, which can be accessed through a browser or automated script over the network.

Generated by OpenCVE AI on April 16, 2026 at 02:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ActivityPub WordPress plugin to version 8.0.2 or newer.
  • If an upgrade cannot be performed immediately, disable or delete the ActivityPub plugin until a patch is available.
  • As a temporary measure, restrict access to the plugin’s routing endpoints to authenticated users by configuring WordPress or web server access controls, or by adding an authentication check through a WordPress hook.

Generated by OpenCVE AI on April 16, 2026 at 02:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-285

Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Automattic
Automattic activitypub
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*
Vendors & Products Automattic
Automattic activitypub

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Activitypub
Activitypub activitypub
Wordpress
Wordpress wordpress
Vendors & Products Activitypub
Activitypub activitypub
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-284

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts
Title ActivityPub Routing < 8.0.2 - Unauthenticated Drafts/Scheduled/Pending Posts Disclosure
References

Subscriptions

Activitypub Activitypub
Automattic Activitypub
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-08T16:06:53.365Z

Reserved: 2026-03-17T14:54:23.077Z

Link: CVE-2026-4338

cve-icon Vulnrichment

Updated: 2026-04-08T16:06:49.990Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T07:16:22.400

Modified: 2026-04-14T16:23:09.433

Link: CVE-2026-4338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:45:06Z