Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1582: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in soflyy WP All Export – Drag & Drop Export to Any Custom CSV, XML & Excel

0
Low
VulnerabilityCVE-2026-1582cvecve-2026-1582cwe-200
Published: Wed Feb 18 2026 (02/18/2026, 12:28:35 UTC)
Source: CVE Database V5
Vendor/Project: soflyy
Product: WP All Export – Drag & Drop Export to Any Custom CSV, XML & Excel

Description

The WP All Export plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.14 via the export download endpoint. This is due to a PHP type juggling vulnerability in the security token comparison which uses loose comparison (==) instead of strict comparison (===). This makes it possible for unauthenticated attackers to bypass authentication using "magic hash" values when the expected MD5 hash prefix happens to be numeric-looking (matching pattern ^0e\d+$), allowing download of sensitive export files containing PII, business data, or database information.

AI-Powered Analysis

AILast updated: 02/18/2026, 13:00:12 UTC

Technical Analysis

The WP All Export plugin for WordPress, widely used for exporting data to CSV, XML, and Excel formats, contains a vulnerability identified as CVE-2026-1582. This vulnerability stems from a PHP type juggling issue in the plugin's export download endpoint. Specifically, the security token comparison uses a loose equality operator (==) rather than a strict equality operator (===). In PHP, this can lead to 'magic hash' exploitation, where certain strings that look numeric (matching the regex pattern ^0e\d+$) are interpreted as zero in scientific notation, causing the loose comparison to incorrectly evaluate as true. Attackers can craft or identify such 'magic hash' values to bypass authentication checks on the export download endpoint. This allows unauthenticated users to download sensitive export files that may contain PII, business intelligence, or database information. The vulnerability affects all plugin versions up to and including 1.4.14. The CVSS 3.1 base score is 3.7, indicating a low severity primarily due to the complexity of exploitation and limited impact on integrity and availability. However, the confidentiality impact is non-negligible as sensitive data exposure can lead to privacy violations or business risks. No patches or fixes have been officially released at the time of publication, and no active exploitation has been reported. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Potential Impact

For European organizations, the exposure of sensitive export files containing PII or business data can have significant privacy and compliance implications, especially under GDPR regulations which mandate strict controls over personal data. Unauthorized access to such data could lead to data breaches, reputational damage, regulatory fines, and loss of customer trust. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is critical in sectors handling sensitive customer or employee information, such as finance, healthcare, and e-commerce. The ease of exploitation is moderate due to the need to identify or generate suitable 'magic hash' values, but the lack of required authentication lowers the barrier for attackers. Organizations relying on WP All Export for data handling are at risk of inadvertent data leakage if the plugin is not updated or mitigated. The impact is more pronounced for entities exporting large volumes of sensitive data regularly.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if WP All Export plugin versions up to 1.4.14 are in use. If so, they should restrict access to the export download endpoint via web application firewall (WAF) rules or IP whitelisting to limit exposure. Until an official patch is released, disabling the export functionality or the plugin entirely is advisable if sensitive data export is not critical. Monitoring web server logs for unusual access patterns to the export endpoint can help detect exploitation attempts. Organizations should also review exported data storage and transmission practices to ensure encryption and access controls are in place. Applying strict input validation and avoiding reliance on PHP loose comparisons in custom code can prevent similar vulnerabilities. Finally, maintain awareness for vendor updates or patches and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-29T00:43:49.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995b46b80d747be206b616e

Added to database: 2/18/2026, 12:45:31 PM

Last enriched: 2/18/2026, 1:00:12 PM

Last updated: 2/18/2026, 2:47:03 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats