Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2284: CWE-862 Missing Authorization in webangon News Element Elementor Blog Magazine

0
Medium
VulnerabilityCVE-2026-2284cvecve-2026-2284cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:26 UTC)
Source: CVE Database V5
Vendor/Project: webangon
Product: News Element Elementor Blog Magazine

Description

The News Element Elementor Blog Magazine plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.8. This is due to a missing capability check and nonce verification on the 'ne_clean_data' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to truncate 8 core WordPress database tables (posts, comments, terms, term_relationships, term_taxonomy, postmeta, commentmeta, termmeta) and delete the entire WordPress uploads directory, resulting in complete data loss.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 05:12:49 UTC

Technical Analysis

CVE-2026-2284 identifies a Missing Authorization vulnerability (CWE-862) in the News Element Elementor Blog Magazine plugin for WordPress, affecting all versions up to 1.0.8. The root cause is the lack of capability checks and nonce verification on the 'ne_clean_data' AJAX action, which is intended to perform data cleaning operations. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can invoke this AJAX action to truncate eight core WordPress database tables: posts, comments, terms, term_relationships, term_taxonomy, postmeta, commentmeta, and termmeta. Additionally, the attacker can delete the entire WordPress uploads directory, which typically contains all media files. This results in severe data loss, impacting both the integrity and availability of the affected WordPress site. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 5.4 (medium), reflecting the ease of exploitation (low attack complexity), the requirement for low privileges (PR:L), and the significant impact on integrity and availability, though confidentiality is not affected. No patches or exploits are currently publicly available, but the risk remains significant due to the destructive potential. The vulnerability was published on February 19, 2026, and assigned by Wordfence. The absence of nonce verification also indicates a lack of protection against CSRF attacks, further increasing risk if combined with other vulnerabilities.

Potential Impact

For European organizations, this vulnerability poses a critical risk to websites running WordPress with the News Element Elementor Blog Magazine plugin. The ability for low-privileged authenticated users to delete core database tables and media files can lead to complete site outages, loss of content, and significant operational disruption. This can affect e-commerce platforms, corporate blogs, news portals, and any public-facing websites relying on this plugin. Data loss may also result in reputational damage and potential regulatory consequences under GDPR if personal data stored in affected tables is lost or compromised. Recovery efforts could be costly and time-consuming, especially if recent backups are unavailable. The vulnerability's exploitation could be leveraged by insider threats or compromised subscriber accounts, making internal security controls critical. Given the widespread use of WordPress and Elementor-based plugins in Europe, the threat surface is substantial. Organizations in sectors such as media, education, government, and SMEs that rely on WordPress for content management are particularly vulnerable.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the 'ne_clean_data' AJAX action to only trusted administrator roles by implementing proper capability checks in the plugin code. Site administrators should disable or remove the vulnerable plugin if patching is not yet available. Applying web application firewall (WAF) rules to block unauthorized AJAX requests targeting this action can provide temporary protection. Regular backups of the WordPress database and uploads directory should be maintained and tested for restoration to minimize data loss impact. Monitoring user accounts for suspicious activity, especially those with Subscriber-level access, can help detect exploitation attempts. Organizations should follow up with the plugin vendor for official patches and updates. Additionally, implementing multi-factor authentication (MFA) for all WordPress user accounts can reduce the risk of account compromise. Security teams should audit all installed plugins for similar authorization issues and ensure WordPress core and plugins are kept up to date.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-10T14:40:00.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f66aea4a407a3be124

Added to database: 2/19/2026, 4:56:22 AM

Last enriched: 2/19/2026, 5:12:49 AM

Last updated: 4/9/2026, 3:59:26 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses