Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1060: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in litonice13 WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer

0
Medium
VulnerabilityCVE-2026-1060cvecve-2026-1060cwe-200
Published: Wed Jan 28 2026 (01/28/2026, 14:25:11 UTC)
Source: CVE Database V5
Vendor/Project: litonice13
Product: WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer

Description

CVE-2026-1060 is a medium-severity vulnerability in the WP Adminify WordPress plugin versions up to 4. 0. 7. 7. It allows unauthenticated attackers to access sensitive information through the /wp-json/adminify/v1/get-addons-list REST API endpoint, which is improperly configured to permit unrestricted access. The exposed data includes the full list of available addons, their installation status, version numbers, and download URLs. Although this vulnerability does not allow direct modification or disruption of the system, it leaks information that could aid attackers in crafting targeted attacks or identifying outdated components. No known exploits are currently reported in the wild. European organizations using this plugin should prioritize patching or mitigating this issue to prevent information leakage that could facilitate further compromise. Countries with high WordPress usage and significant adoption of this plugin, such as Germany, the UK, and France, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/28/2026, 14:50:14 UTC

Technical Analysis

The WP Adminify plugin for WordPress, widely used for white labeling, admin menu editing, and login customization, suffers from a sensitive information exposure vulnerability identified as CVE-2026-1060. This vulnerability arises because the REST API endpoint /wp-json/adminify/v1/get-addons-list is registered with a permission callback set to __return_true, effectively disabling any authentication or authorization checks. As a result, any unauthenticated user can query this endpoint and retrieve detailed information about all available addons, including which are installed, their exact version numbers, and download URLs. This exposure falls under CWE-200, indicating that sensitive information is disclosed to unauthorized actors. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication or user interaction, but only impacts confidentiality without affecting integrity or availability. Although no exploits have been reported in the wild, the leaked information can be leveraged by attackers to identify vulnerable plugin versions or plan further attacks such as targeted exploits or social engineering. The vulnerability affects all versions up to and including 4.0.7.7 of the WP Adminify plugin. Since WordPress is a popular CMS in Europe, and WP Adminify is used by organizations seeking customized admin interfaces, this vulnerability presents a meaningful risk if left unaddressed.

Potential Impact

For European organizations, the exposure of addon details can facilitate reconnaissance by threat actors, enabling them to identify outdated or vulnerable plugin versions and tailor attacks accordingly. This can increase the risk of subsequent exploitation, such as privilege escalation or site compromise, especially if the exposed versions have known exploits. While the vulnerability itself does not allow direct modification or denial of service, the information leakage undermines confidentiality and can weaken the overall security posture. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if attackers leverage this information to breach systems. Additionally, the exposure of download URLs could allow attackers to distribute malicious versions or conduct supply chain attacks if users rely on these URLs without verification. Given the widespread use of WordPress in Europe, the vulnerability could affect a broad range of organizations, from SMEs to large enterprises, increasing the attack surface.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the vulnerable REST API endpoint. This can be achieved by implementing authentication and authorization checks at the web server or application firewall level to block unauthenticated requests to /wp-json/adminify/v1/get-addons-list. Organizations should monitor API access logs for unusual or repeated requests to this endpoint, which may indicate reconnaissance activity. Until an official patch is released, consider disabling or uninstalling the WP Adminify plugin if feasible, or replacing it with alternative plugins that do not expose sensitive information. Once a patch or updated plugin version is available, apply it promptly to remove the vulnerability. Additionally, conduct regular plugin audits to identify and update outdated components, and educate administrators about the risks of exposing internal plugin data. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious REST API calls can provide an additional layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-16T19:04:24.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a1ed44623b1157cc754bb

Added to database: 1/28/2026, 2:36:04 PM

Last enriched: 1/28/2026, 2:50:14 PM

Last updated: 1/28/2026, 4:18:15 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats