Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0909: CWE-639 Authorization Bypass Through User-Controlled Key in alimir WP ULike – Engagement Analytics & Interactive Buttons to Understand Your Audience

0
Medium
VulnerabilityCVE-2026-0909cvecve-2026-0909cwe-639
Published: Tue Feb 03 2026 (02/03/2026, 03:24:35 UTC)
Source: CVE Database V5
Vendor/Project: alimir
Product: WP ULike – Engagement Analytics & Interactive Buttons to Understand Your Audience

Description

The WP ULike plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.8.3.1. This is due to the `wp_ulike_delete_history_api` AJAX action not verifying that the log entry being deleted belongs to the current user. This makes it possible for authenticated attackers, with Subscriber-level access and above (granted the 'stats' capability is assigned to their role), to delete arbitrary log entries belonging to other users via the 'id' parameter.

AI-Powered Analysis

AILast updated: 02/26/2026, 18:45:40 UTC

Technical Analysis

The WP ULike plugin, widely used for engagement analytics and interactive buttons on WordPress sites, suffers from an authorization bypass vulnerability identified as CVE-2026-0909. This vulnerability is due to an Insecure Direct Object Reference (IDOR) flaw (CWE-639) in the AJAX action 'wp_ulike_delete_history_api'. Specifically, the plugin does not verify whether the log entry targeted for deletion belongs to the authenticated user initiating the request. As a result, any authenticated user with at least Subscriber-level access and the 'stats' capability assigned to their role can delete arbitrary log entries belonging to other users by manipulating the 'id' parameter in the AJAX request. The vulnerability affects all versions up to and including 4.8.3.1. The CVSS 3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). The flaw compromises data integrity by allowing unauthorized deletion of user engagement logs, which could affect analytics accuracy and user activity records. No patches or exploits are currently publicly available, but the vulnerability poses a risk to WordPress sites relying on this plugin for audience engagement metrics.

Potential Impact

The primary impact of CVE-2026-0909 is on the integrity of user engagement data within WordPress sites using the WP ULike plugin. Unauthorized deletion of log entries can lead to inaccurate analytics, loss of historical user interaction data, and potential disruption of audience understanding. While this does not directly affect confidentiality or availability, the manipulation of engagement data can undermine trust in analytics-driven decisions and marketing strategies. For organizations relying heavily on user engagement metrics for business intelligence, this could result in misguided decisions or loss of competitive advantage. Additionally, if log entries are used for auditing or compliance purposes, their unauthorized deletion could complicate forensic investigations or regulatory reporting. The vulnerability requires only authenticated access with minimal privileges, increasing the risk of exploitation by low-level users or compromised accounts. Although no known exploits are reported, the ease of exploitation and broad user base of WordPress sites make this a relevant threat to many organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-0909, organizations should immediately update the WP ULike plugin to a patched version once available. In the absence of an official patch, administrators can implement custom access control checks in the plugin code to verify that the authenticated user owns the log entry before allowing deletion. Restricting the 'stats' capability to trusted roles only and auditing user roles and permissions can reduce the attack surface. Employing Web Application Firewalls (WAFs) to monitor and block suspicious AJAX requests targeting the 'wp_ulike_delete_history_api' action can provide temporary protection. Regularly reviewing user activity logs for unusual deletion patterns and enforcing strong authentication mechanisms to prevent account compromise are also recommended. Finally, organizations should consider isolating or limiting plugin usage on critical systems until the vulnerability is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-13T18:21:37.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6981764df9fa50a62fa17c8d

Added to database: 2/3/2026, 4:15:09 AM

Last enriched: 2/26/2026, 6:45:40 PM

Last updated: 3/20/2026, 5:43:54 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses