Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1867: CWE-200 Information Exposure in Guest posting / Frontend Posting / Front Editor

0
High
VulnerabilityCVE-2026-1867cvecve-2026-1867cwe-200
Published: Wed Mar 11 2026 (03/11/2026, 06:00:09 UTC)
Source: CVE Database V5
Product: Guest posting / Frontend Posting / Front Editor

Description

CVE-2026-1867 is an information exposure vulnerability in the Guest posting / Frontend Posting / Front Editor WordPress plugin versions before 5. 0. 6. The flaw allows unauthenticated attackers to pass a URL parameter that triggers regeneration and download of a . json file containing form data and settings. If an administrator has modified the demo form and enabled admin notifications, sensitive information such as the administrator's email address can be extracted. This vulnerability does not require authentication or user interaction, making it accessible to remote attackers. Although no known exploits are reported in the wild, the exposure of administrative contact details can facilitate targeted phishing or further attacks. The vulnerability arises from improper access control and insufficient protection of sensitive configuration data. Organizations using this plugin on WordPress sites should prioritize updating to a patched version once available or implement immediate mitigations to restrict access.

AI-Powered Analysis

AILast updated: 03/11/2026, 06:29:45 UTC

Technical Analysis

CVE-2026-1867 is a vulnerability classified under CWE-200 (Information Exposure) affecting the Guest posting / Frontend Posting / Front Editor WordPress plugin prior to version 5.0.6. The plugin includes a feature that allows regeneration of a .json file containing demo form data via a URL parameter. When an administrator customizes the demo form and enables admin notifications, this .json file contains sensitive configuration data, including the administrator's email address. Due to insufficient access controls, an unauthenticated attacker can exploit this by crafting a specific URL to trigger the regeneration and download of this .json file without any authentication or user interaction. This exposure can leak sensitive information that may be used for social engineering, phishing campaigns, or to facilitate further attacks against the site or administrator. The vulnerability stems from the plugin's failure to properly restrict access to sensitive data export functionality. No CVSS score is assigned yet, and no known exploits have been reported in the wild. However, the flaw represents a significant risk to confidentiality and privacy of site administrators. The affected plugin is used in WordPress environments, which are widespread globally, making the potential attack surface large. The vulnerability was publicly disclosed in March 2026, with no patch links currently available, indicating that immediate mitigation steps are necessary to reduce risk.

Potential Impact

The primary impact of CVE-2026-1867 is the unauthorized disclosure of sensitive configuration data, including administrator email addresses, from WordPress sites using the vulnerable plugin. This information exposure can lead to targeted phishing attacks, social engineering, and reconnaissance activities by attackers. While the vulnerability does not directly allow code execution or site takeover, the leaked data can be a stepping stone for more severe attacks. Organizations relying on this plugin risk compromise of administrator accounts or increased attack surface due to exposed contact information. The vulnerability affects confidentiality and potentially integrity if attackers leverage the information to gain further access. Because exploitation requires no authentication or user interaction, the threat is accessible to any remote attacker scanning for vulnerable sites. The scope includes all WordPress sites running the affected plugin versions, which can be substantial given WordPress's global popularity. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Overall, the impact is significant for organizations that value the privacy of their administrative contacts and the security posture of their WordPress deployments.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the vulnerable plugin functionality by implementing web application firewall (WAF) rules that block requests containing the specific URL parameter used to regenerate the .json file. 2. Disable or restrict the Guest posting / Frontend Posting / Front Editor plugin if it is not essential to site operations until a patched version is released. 3. Monitor web server logs for suspicious requests targeting the .json regeneration endpoint to detect potential exploitation attempts. 4. Limit administrative privileges and avoid enabling admin notifications in the plugin settings unless necessary. 5. Once available, promptly update the plugin to version 5.0.6 or later that addresses this vulnerability. 6. Consider implementing additional access controls such as IP whitelisting or authentication requirements for accessing sensitive plugin features. 7. Educate site administrators about phishing risks stemming from exposed email addresses and encourage use of multifactor authentication to protect accounts. 8. Regularly audit WordPress plugins for security updates and vulnerabilities to maintain a secure environment. These steps go beyond generic advice by focusing on immediate access restriction, monitoring, and administrative best practices tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-02-03T21:55:33.287Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b108572f860ef94335d437

Added to database: 3/11/2026, 6:14:47 AM

Last enriched: 3/11/2026, 6:29:45 AM

Last updated: 3/11/2026, 10:00:54 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses