Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1389: CWE-639 Authorization Bypass Through User-Controlled Key in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files

0
Medium
VulnerabilityCVE-2026-1389cvecve-2026-1389cwe-639
Published: Wed Jan 28 2026 (01/28/2026, 07:27:34 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Document Embedder – Embed PDFs, Word, Excel, and Other Files

Description

CVE-2026-1389 is a medium-severity authorization bypass vulnerability in the WordPress plugin 'Document Embedder – Embed PDFs, Word, Excel, and Other Files' (versions up to 2. 0. 4). The flaw arises from insecure direct object references (CWE-639) due to missing permission checks in key AJAX actions, allowing authenticated users with Author-level access or higher to read, modify, or delete document library entries belonging to other users, including administrators. Exploitation requires no user interaction beyond authentication and can impact data integrity but not confidentiality or availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with multiple user roles and sensitive document management needs. Mitigation involves updating the plugin once a patch is available or restricting Author-level permissions and auditing document access controls. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:29:36 UTC

Technical Analysis

CVE-2026-1389 identifies an authorization bypass vulnerability in the WordPress plugin 'Document Embedder – Embed PDFs, Word, Excel, and Other Files' (bplugins), affecting all versions up to and including 2.0.4. The root cause is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-639, where the plugin fails to verify user permissions when handling AJAX actions 'bplde_save_document_library', 'bplde_get_single', and 'bplde_delete_document_library'. These actions allow authenticated users with Author-level privileges or higher to manipulate the 'id' parameter to access, modify, or delete document library entries created by other users, including administrators. This bypass of authorization controls compromises the integrity of document data but does not expose confidential data directly nor affect system availability. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the moderate impact and ease of exploitation. No patches or known exploits are currently documented, indicating the need for proactive mitigation. The vulnerability affects WordPress sites using this plugin, which is popular for embedding various document types, potentially exposing sensitive organizational documents to unauthorized modification or deletion.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of embedded document content on WordPress sites, particularly those that rely on the Document Embedder plugin for managing PDFs, Word documents, Excel files, and other embedded resources. Attackers with Author-level access—often contributors or editors—can alter or delete documents created by other users, including administrators, potentially disrupting business operations, damaging trust, or causing data loss. While confidentiality is not directly impacted, unauthorized modification could lead to misinformation or compliance issues, especially in regulated sectors such as finance, healthcare, or government. The vulnerability could also facilitate privilege escalation or lateral movement if attackers manipulate critical documents or configurations. Given WordPress's widespread use in Europe and the plugin's functionality, organizations with multi-user content management workflows are particularly vulnerable. The lack of known exploits suggests limited immediate threat but also highlights the importance of timely remediation to prevent future attacks.

Mitigation Recommendations

1. Monitor the vendor's official channels for a security patch and apply updates promptly once available. 2. Until patched, restrict Author-level permissions on WordPress sites using this plugin to trusted users only, minimizing the risk of exploitation. 3. Implement strict role-based access controls and audit user permissions regularly to ensure no excessive privileges are granted. 4. Consider disabling or replacing the Document Embedder plugin with alternatives that enforce proper authorization checks. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable endpoints. 6. Conduct regular security audits and penetration testing focusing on WordPress plugins and user privilege escalation paths. 7. Educate site administrators and content managers about the risks of privilege misuse and encourage strong authentication practices. 8. Backup document libraries frequently to enable recovery in case of unauthorized deletions or modifications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-23T20:51:53.837Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979bc5c4623b1157c9e0bc8

Added to database: 1/28/2026, 7:35:56 AM

Last enriched: 2/4/2026, 9:29:36 AM

Last updated: 2/7/2026, 11:13:22 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats