Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3058: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in seraphinitesoft Seraphinite Accelerator

0
Medium
VulnerabilityCVE-2026-3058cvecve-2026-3058cwe-200
Published: Wed Mar 04 2026 (03/04/2026, 11:22:31 UTC)
Source: CVE Database V5
Vendor/Project: seraphinitesoft
Product: Seraphinite Accelerator

Description

CVE-2026-3058 is a medium-severity vulnerability in the Seraphinite Accelerator WordPress plugin, affecting all versions up to 2. 28. 14. It allows authenticated users with Subscriber-level access or higher to exploit the `seraph_accel_api` AJAX action with the `fn=GetData` parameter to retrieve sensitive operational data. The root cause is the lack of capability checks in the `OnAdminApi_GetData()` function, enabling unauthorized exposure of cache status, scheduled task information, and external database state. This vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact integrity or availability, the confidentiality breach could aid attackers in further reconnaissance or targeted attacks. No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or applying access control restrictions to mitigate risk. Countries with significant WordPress usage and Seraphinite Accelerator deployment are most at risk.

AI-Powered Analysis

AILast updated: 03/04/2026, 11:47:36 UTC

Technical Analysis

CVE-2026-3058 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the Seraphinite Accelerator plugin for WordPress, affecting all versions up to and including 2.28.14. The vulnerability arises because the `OnAdminApi_GetData()` function, which handles the AJAX action `seraph_accel_api` with the parameter `fn=GetData`, does not perform any capability or permission checks. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this API endpoint and retrieve sensitive operational data that should be restricted. The exposed data includes cache status, scheduled task information, and the state of external databases connected to the plugin. Since Subscriber-level access is relatively low privilege in WordPress, this vulnerability significantly lowers the barrier for attackers to gather internal system information that could facilitate further attacks. The vulnerability is remotely exploitable over the network without user interaction, increasing its risk profile. The CVSS v3.1 score is 4.3 (medium), reflecting the limited scope of confidentiality impact without integrity or availability compromise. No patches or exploit code are currently publicly available, but the absence of capability checks is a fundamental security oversight that should be addressed promptly.

Potential Impact

The primary impact of CVE-2026-3058 is the unauthorized disclosure of sensitive operational information within WordPress environments using the Seraphinite Accelerator plugin. Exposure of cache status and scheduled task details can provide attackers with insights into system behavior and timing, which can be leveraged for timing attacks or to evade detection. Disclosure of external database state may reveal configuration details or data structures that facilitate further exploitation or data exfiltration. Although the vulnerability does not directly compromise data integrity or system availability, the confidentiality breach can aid attackers in reconnaissance and lateral movement within the affected environment. Organizations relying on this plugin may face increased risk of targeted attacks, especially if attackers combine this information with other vulnerabilities or social engineering. The medium severity rating indicates moderate risk, but the ease of exploitation by low-privilege users makes it a notable concern for WordPress sites with multiple user roles.

Mitigation Recommendations

To mitigate CVE-2026-3058, organizations should immediately update the Seraphinite Accelerator plugin to a version that includes proper capability checks in the `OnAdminApi_GetData()` function once available. Until a patch is released, administrators should restrict access to the plugin’s AJAX endpoints by implementing additional access controls, such as limiting AJAX requests to trusted roles only or disabling the plugin if not essential. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX calls to `seraph_accel_api` with `fn=GetData` can reduce exposure. Regularly auditing user roles and minimizing the number of users with Subscriber-level or higher access reduces the attack surface. Monitoring logs for unusual API requests and anomalous data access patterns can help detect exploitation attempts. Finally, educating site administrators about the risks of granting unnecessary privileges and maintaining up-to-date backups will aid in recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-23T18:06:28.405Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a81880d1a09e29cb2f531b

Added to database: 3/4/2026, 11:33:20 AM

Last enriched: 3/4/2026, 11:47:36 AM

Last updated: 3/4/2026, 12:49:31 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses