Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2504: CWE-862 Missing Authorization in dealia Dealia – Request a quote

0
Medium
VulnerabilityCVE-2026-2504cvecve-2026-2504cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:23 UTC)
Source: CVE Database V5
Vendor/Project: dealia
Product: Dealia – Request a quote

Description

CVE-2026-2504 is a medium severity vulnerability in the Dealia – Request a quote WordPress plugin affecting all versions up to 1. 0. 6. It arises from missing authorization checks on multiple AJAX handlers, allowing authenticated users with Contributor-level access or higher to reset plugin configurations without proper privileges. The vulnerability stems from exposing an admin nonce to users with edit_posts capability and verifying only the nonce without checking for 'manage_options' capability. Exploitation does not require user interaction and can lead to unauthorized modification of plugin settings, potentially impacting site functionality or security. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent misuse by lower-privileged authenticated users.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:12:14 UTC

Technical Analysis

The Dealia – Request a quote plugin for WordPress suffers from a missing authorization vulnerability (CWE-862) identified as CVE-2026-2504. The core issue lies in the plugin's AJAX handlers within AdminSettingsController.php, which verify the admin nonce (DEALIA_ADMIN_NONCE) but fail to check whether the requesting user has the 'manage_options' capability, a privilege typically reserved for administrators. The nonce itself is exposed to all users with the 'edit_posts' capability (Contributor role and above) via wp_localize_script() in PostsController.php, effectively allowing contributors and higher roles to access it. Since the AJAX handlers do not enforce proper capability checks, an authenticated user with contributor-level access can invoke these handlers to reset the plugin configuration without authorization. This vulnerability does not affect confidentiality or availability directly but impacts integrity by allowing unauthorized modification of plugin settings. The CVSS 3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network vector (AV:N), and limited impact on integrity (I:L) without affecting confidentiality or availability. No user interaction is required (UI:N), and the scope remains unchanged (S:U). No patches are currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized changes in the Dealia plugin configuration by users with contributor-level access, potentially disrupting business processes relying on the plugin's functionality, such as quote requests or customer interactions. While it does not directly expose sensitive data or cause denial of service, unauthorized configuration changes could degrade service quality, introduce misconfigurations, or open avenues for further exploitation if combined with other vulnerabilities. Organizations with multi-user WordPress environments where contributors or editors have authenticated access are particularly at risk. This may affect e-commerce, customer service, or lead generation websites using the plugin. The impact is more pronounced in sectors where website integrity and customer interaction workflows are critical, such as retail, professional services, and public sector websites. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers discover or develop exploit code.

Mitigation Recommendations

Immediate mitigation involves restricting contributor-level users from accessing or invoking the vulnerable AJAX handlers. Site administrators should audit user roles and capabilities to ensure only trusted users have edit_posts or higher privileges. Implement custom capability checks or filters to enforce 'manage_options' capability on AJAX endpoints if patching is not yet available. Monitoring and logging AJAX requests related to the plugin can help detect suspicious activity. If possible, temporarily disable the Dealia – Request a quote plugin until a patched version is released. Additionally, consider applying Web Application Firewall (WAF) rules to block unauthorized AJAX requests targeting the plugin's endpoints. Regularly update WordPress core and plugins, and subscribe to vendor advisories for patch releases. Educate site administrators about the risks of granting elevated privileges to contributors and enforce the principle of least privilege.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-13T22:10:20.072Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f66aea4a407a3be130

Added to database: 2/19/2026, 4:56:22 AM

Last enriched: 2/19/2026, 5:12:14 AM

Last updated: 2/19/2026, 6:04:43 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats