Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2589: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpsoul Greenshift – animation and page builder blocks

0
Medium
VulnerabilityCVE-2026-2589cvecve-2026-2589cwe-200
Published: Thu Mar 05 2026 (03/05/2026, 23:21:30 UTC)
Source: CVE Database V5
Vendor/Project: wpsoul
Product: Greenshift – animation and page builder blocks

Description

CVE-2026-2589 is a medium-severity vulnerability in the Greenshift animation and page builder blocks WordPress plugin (versions up to 12. 8. 3). It allows unauthenticated attackers to access sensitive information via an automated Settings Backup file that is publicly accessible. This exposure includes API keys for services such as OpenAI, Claude, Google Maps, Gemini, DeepSeek, and Cloudflare Turnstile. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently active in the wild, the leakage of API keys can lead to unauthorized use of third-party services and potential further compromise. Organizations using this plugin should urgently restrict access to backup files and update or patch the plugin once available. The threat primarily affects WordPress sites globally, especially those relying on Greenshift for page building and animation features.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:01:01 UTC

Technical Analysis

CVE-2026-2589 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Greenshift – animation and page builder blocks plugin for WordPress. All versions up to and including 12.8.3 are vulnerable due to the plugin’s automated Settings Backup mechanism, which stores backup files containing sensitive configuration data in locations accessible without authentication. These backup files expose API keys for multiple third-party services, including OpenAI, Claude, Google Maps, Gemini, DeepSeek, and Cloudflare Turnstile. Because these files are publicly accessible, any unauthenticated attacker can retrieve them simply by knowing or discovering the backup file URL. The vulnerability has a CVSS 3.1 base score of 5.3, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact is primarily confidentiality loss, as attackers can misuse the exposed API keys to access or manipulate third-party services, potentially leading to further data leakage, service abuse, or financial costs. No integrity or availability impacts are directly associated with this vulnerability. No patches are currently linked, so mitigation relies on restricting access to backup files and monitoring API key usage. The vulnerability was publicly disclosed in March 2026, with no known exploits in the wild at the time of publication.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive API keys, which can lead to several downstream risks. Attackers gaining access to OpenAI or Claude API keys could generate malicious content or abuse AI services, potentially incurring financial charges or reputational damage. Exposure of Google Maps API keys might allow attackers to exploit quota limits or manipulate map data usage. Similarly, compromised Cloudflare Turnstile keys could undermine anti-bot protections. The leakage of these keys could also facilitate further attacks against the affected organization’s infrastructure or customers by enabling attackers to pivot through third-party services. Organizations relying on Greenshift for website animation and page building may face increased risk of data leakage and service abuse. While the vulnerability does not directly affect website integrity or availability, the indirect consequences of API key misuse can be significant, including financial loss, service disruption, and reputational harm. The lack of authentication or user interaction requirements makes exploitation straightforward for remote attackers, increasing the risk profile.

Mitigation Recommendations

Organizations should immediately audit their web servers hosting Greenshift plugin backups to identify and restrict public access to automated Settings Backup files. Implementing strict access controls such as HTTP authentication or IP whitelisting for backup directories can prevent unauthorized retrieval. If possible, disable the automated backup feature until a secure patch or update is released. Rotate all exposed API keys immediately upon discovery of compromise to prevent unauthorized use. Monitor API usage logs from OpenAI, Claude, Google Maps, Gemini, DeepSeek, and Cloudflare Turnstile for suspicious activity indicative of abuse. Employ web application firewalls (WAFs) to detect and block attempts to access backup files. Stay informed about official patches or updates from the plugin vendor and apply them promptly once available. Additionally, consider isolating API keys with minimal privileges and usage restrictions to limit the impact of potential exposure. Regularly review plugin configurations and file permissions to ensure sensitive data is not inadvertently exposed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-16T14:58:55.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa15bec48b3f10ff8a0fe4

Added to database: 3/5/2026, 11:46:06 PM

Last enriched: 3/6/2026, 12:01:01 AM

Last updated: 3/6/2026, 12:56:23 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses