Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23546: Insertion of Sensitive Information Into Sent Data in RadiusTheme Classified Listing

0
Unknown
VulnerabilityCVE-2026-23546cvecve-2026-23546
Published: Thu Mar 05 2026 (03/05/2026, 05:53:48 UTC)
Source: CVE Database V5
Vendor/Project: RadiusTheme
Product: Classified Listing

Description

Insertion of Sensitive Information Into Sent Data vulnerability in RadiusTheme Classified Listing classified-listing allows Retrieve Embedded Sensitive Data.This issue affects Classified Listing: from n/a through <= 5.3.4.

AI-Powered Analysis

AILast updated: 03/05/2026, 08:34:30 UTC

Technical Analysis

CVE-2026-23546 identifies a vulnerability in the RadiusTheme Classified Listing WordPress plugin, specifically affecting versions up to 5.3.4. The issue involves the insertion of sensitive information into data sent by the plugin, which can be retrieved by unauthorized parties. This vulnerability arises from improper handling or exposure of embedded sensitive data within the plugin's communication or data export mechanisms. While the exact technical vector is not detailed, the nature of the flaw suggests that sensitive information—potentially user data, configuration details, or other confidential content—can be exposed through normal plugin operations or crafted requests. No CVSS score has been assigned, and no public exploits are known, indicating that the vulnerability may be newly disclosed or not yet widely exploited. The plugin is commonly used in WordPress environments to manage classified listings, making websites that rely on it vulnerable to data leakage. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious handling and monitoring. The vulnerability's impact primarily concerns confidentiality, with potential risks to user privacy and organizational data security.

Potential Impact

The primary impact of CVE-2026-23546 is unauthorized disclosure of sensitive information, which can compromise user privacy, expose internal data, and potentially facilitate further attacks such as social engineering or targeted intrusions. Organizations running the affected plugin on classified listing websites risk leaking personal or business-critical data to attackers. This can damage reputation, lead to regulatory non-compliance (especially under data protection laws like GDPR), and cause financial losses. Since the vulnerability involves data insertion into sent data, it may also affect data integrity if attackers manipulate the data flow. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's presence in a popular WordPress plugin means that many websites globally could be affected if exploited. The scope includes any organization or individual using the vulnerable versions of the Classified Listing plugin, particularly those handling sensitive user or business information.

Mitigation Recommendations

1. Monitor official RadiusTheme channels and Patchstack advisories closely for the release of a security patch addressing CVE-2026-23546 and apply updates immediately upon availability. 2. Until a patch is released, restrict access to the Classified Listing plugin’s administrative and data export functionalities to trusted users only, minimizing exposure. 3. Review and audit data transmission and storage processes related to the plugin to identify and block any unauthorized data leakage paths. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin’s data handling endpoints. 5. Conduct regular security assessments and penetration tests focusing on the plugin’s data flows to detect potential exploitation attempts. 6. Educate site administrators about the risks and encourage prompt reporting of unusual behavior or data exposure. 7. Consider temporary disabling or replacing the plugin with alternative solutions if sensitive data exposure risk is unacceptable and no patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-14T08:36:07.869Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9204cd1a09e29cbe698d6

Added to database: 3/5/2026, 6:18:52 AM

Last enriched: 3/5/2026, 8:34:30 AM

Last updated: 3/5/2026, 2:59:29 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses