CVE-2026-1060: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in litonice13 WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer
CVE-2026-1060 is a medium-severity vulnerability in the WP Adminify WordPress plugin versions up to 4. 0. 7. 7. It allows unauthenticated attackers to access sensitive information through the /wp-json/adminify/v1/get-addons-list REST API endpoint, which is improperly configured to permit unrestricted access. The exposed data includes the full list of available addons, their installation status, version numbers, and download URLs. Although this vulnerability does not allow direct modification or disruption of the system, it leaks information that could aid attackers in crafting targeted attacks or identifying outdated components. No known exploits are currently reported in the wild. European organizations using this plugin should prioritize patching or mitigating this issue to prevent information leakage that could facilitate further compromise. Countries with high WordPress usage and significant adoption of this plugin, such as Germany, the UK, and France, are most likely to be affected.
AI Analysis
Technical Summary
The WP Adminify plugin for WordPress, widely used for white labeling, admin menu editing, and login customization, suffers from a sensitive information exposure vulnerability identified as CVE-2026-1060. This vulnerability arises because the REST API endpoint /wp-json/adminify/v1/get-addons-list is registered with a permission callback set to __return_true, effectively disabling any authentication or authorization checks. As a result, any unauthenticated user can query this endpoint and retrieve detailed information about all available addons, including which are installed, their exact version numbers, and download URLs. This exposure falls under CWE-200, indicating that sensitive information is disclosed to unauthorized actors. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication or user interaction, but only impacts confidentiality without affecting integrity or availability. Although no exploits have been reported in the wild, the leaked information can be leveraged by attackers to identify vulnerable plugin versions or plan further attacks such as targeted exploits or social engineering. The vulnerability affects all versions up to and including 4.0.7.7 of the WP Adminify plugin. Since WordPress is a popular CMS in Europe, and WP Adminify is used by organizations seeking customized admin interfaces, this vulnerability presents a meaningful risk if left unaddressed.
Potential Impact
For European organizations, the exposure of addon details can facilitate reconnaissance by threat actors, enabling them to identify outdated or vulnerable plugin versions and tailor attacks accordingly. This can increase the risk of subsequent exploitation, such as privilege escalation or site compromise, especially if the exposed versions have known exploits. While the vulnerability itself does not allow direct modification or denial of service, the information leakage undermines confidentiality and can weaken the overall security posture. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if attackers leverage this information to breach systems. Additionally, the exposure of download URLs could allow attackers to distribute malicious versions or conduct supply chain attacks if users rely on these URLs without verification. Given the widespread use of WordPress in Europe, the vulnerability could affect a broad range of organizations, from SMEs to large enterprises, increasing the attack surface.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable REST API endpoint. This can be achieved by implementing authentication and authorization checks at the web server or application firewall level to block unauthenticated requests to /wp-json/adminify/v1/get-addons-list. Organizations should monitor API access logs for unusual or repeated requests to this endpoint, which may indicate reconnaissance activity. Until an official patch is released, consider disabling or uninstalling the WP Adminify plugin if feasible, or replacing it with alternative plugins that do not expose sensitive information. Once a patch or updated plugin version is available, apply it promptly to remove the vulnerability. Additionally, conduct regular plugin audits to identify and update outdated components, and educate administrators about the risks of exposing internal plugin data. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious REST API calls can provide an additional layer of defense.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1060: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in litonice13 WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer
Description
CVE-2026-1060 is a medium-severity vulnerability in the WP Adminify WordPress plugin versions up to 4. 0. 7. 7. It allows unauthenticated attackers to access sensitive information through the /wp-json/adminify/v1/get-addons-list REST API endpoint, which is improperly configured to permit unrestricted access. The exposed data includes the full list of available addons, their installation status, version numbers, and download URLs. Although this vulnerability does not allow direct modification or disruption of the system, it leaks information that could aid attackers in crafting targeted attacks or identifying outdated components. No known exploits are currently reported in the wild. European organizations using this plugin should prioritize patching or mitigating this issue to prevent information leakage that could facilitate further compromise. Countries with high WordPress usage and significant adoption of this plugin, such as Germany, the UK, and France, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
The WP Adminify plugin for WordPress, widely used for white labeling, admin menu editing, and login customization, suffers from a sensitive information exposure vulnerability identified as CVE-2026-1060. This vulnerability arises because the REST API endpoint /wp-json/adminify/v1/get-addons-list is registered with a permission callback set to __return_true, effectively disabling any authentication or authorization checks. As a result, any unauthenticated user can query this endpoint and retrieve detailed information about all available addons, including which are installed, their exact version numbers, and download URLs. This exposure falls under CWE-200, indicating that sensitive information is disclosed to unauthorized actors. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication or user interaction, but only impacts confidentiality without affecting integrity or availability. Although no exploits have been reported in the wild, the leaked information can be leveraged by attackers to identify vulnerable plugin versions or plan further attacks such as targeted exploits or social engineering. The vulnerability affects all versions up to and including 4.0.7.7 of the WP Adminify plugin. Since WordPress is a popular CMS in Europe, and WP Adminify is used by organizations seeking customized admin interfaces, this vulnerability presents a meaningful risk if left unaddressed.
Potential Impact
For European organizations, the exposure of addon details can facilitate reconnaissance by threat actors, enabling them to identify outdated or vulnerable plugin versions and tailor attacks accordingly. This can increase the risk of subsequent exploitation, such as privilege escalation or site compromise, especially if the exposed versions have known exploits. While the vulnerability itself does not allow direct modification or denial of service, the information leakage undermines confidentiality and can weaken the overall security posture. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if attackers leverage this information to breach systems. Additionally, the exposure of download URLs could allow attackers to distribute malicious versions or conduct supply chain attacks if users rely on these URLs without verification. Given the widespread use of WordPress in Europe, the vulnerability could affect a broad range of organizations, from SMEs to large enterprises, increasing the attack surface.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable REST API endpoint. This can be achieved by implementing authentication and authorization checks at the web server or application firewall level to block unauthenticated requests to /wp-json/adminify/v1/get-addons-list. Organizations should monitor API access logs for unusual or repeated requests to this endpoint, which may indicate reconnaissance activity. Until an official patch is released, consider disabling or uninstalling the WP Adminify plugin if feasible, or replacing it with alternative plugins that do not expose sensitive information. Once a patch or updated plugin version is available, apply it promptly to remove the vulnerability. Additionally, conduct regular plugin audits to identify and update outdated components, and educate administrators about the risks of exposing internal plugin data. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious REST API calls can provide an additional layer of defense.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-16T19:04:24.186Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697a1ed44623b1157cc754bb
Added to database: 1/28/2026, 2:36:04 PM
Last enriched: 1/28/2026, 2:50:14 PM
Last updated: 1/28/2026, 4:18:15 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61140: n/a
UnknownCVE-2025-69517: n/a
HighCVE-2025-57283: n/a
HighCVE-2025-70336: n/a
HighCVE-2026-23830: CWE-94: Improper Control of Generation of Code ('Code Injection') in nyariv SandboxJS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.