Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3550: CWE-862 Missing Authorization in firetree RockPress

0
Medium
VulnerabilityCVE-2026-3550cvecve-2026-3550cwe-862
Published: Fri Mar 20 2026 (03/20/2026, 08:25:58 UTC)
Source: CVE Database V5
Vendor/Project: firetree
Product: RockPress

Description

CVE-2026-3550 is a medium severity vulnerability in the RockPress WordPress plugin (up to version 1. 0. 17) caused by missing authorization checks on multiple AJAX actions. The plugin exposes a nonce to all authenticated users via an admin script loaded on all admin pages without restrictions. Because the AJAX handlers only verify the nonce and not user capabilities, any authenticated user, including those with Subscriber-level access, can exploit this to trigger resource-intensive import operations, reset import data, and check service connectivity. This flaw allows unauthorized users to perform administrative actions that should be restricted, potentially disrupting site functionality and data integrity. No known exploits are currently reported in the wild. Organizations using RockPress should urgently review user roles and update or patch the plugin once a fix is available.

AI-Powered Analysis

AILast updated: 03/20/2026, 09:09:12 UTC

Technical Analysis

The RockPress plugin for WordPress suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2026-3550. This vulnerability exists in all versions up to and including 1.0.17 due to the absence of proper capability checks on several AJAX endpoints: rockpress_import, rockpress_import_status, rockpress_last_import, rockpress_reset_import, and rockpress_check_services. The plugin enqueues an admin script named 'rockpress-admin' on all admin pages, including profile.php, without restricting it to specific pages or user capabilities. This script exposes a nonce ('rockpress-nonce') to all authenticated users via wp_localize_script. The AJAX handlers validate only this nonce but do not verify the current user's permissions (i.e., they do not call current_user_can()). Consequently, any authenticated user—even those with minimal privileges such as Subscribers—can extract the nonce from the HTML source of any admin page and invoke these AJAX actions. Exploitation allows attackers to trigger resource-intensive import operations, reset import tracking data (which deletes options), and perform system connection checks that should be limited to administrators. While the vulnerability does not allow direct data disclosure or site takeover, it undermines the integrity of import operations and can lead to denial of service or operational disruption. The CVSS v3.1 base score is 5.3 (medium), reflecting network exploitability with low attack complexity and no required privileges beyond authentication. No public exploits have been reported, but the vulnerability poses a risk to any WordPress site using RockPress with multiple authenticated users.

Potential Impact

The primary impact of CVE-2026-3550 is unauthorized execution of administrative AJAX actions by low-privileged authenticated users. This can lead to several adverse effects: (1) Triggering resource-intensive import operations may degrade server performance or cause denial of service conditions, impacting site availability. (2) Resetting import tracking data deletes stored options, potentially disrupting import workflows and causing data loss or inconsistency. (3) Performing system connection checks could reveal internal service status or cause unintended side effects. Although confidentiality is not directly impacted, the integrity and availability of the import functionality are compromised. For organizations relying on RockPress for critical import tasks, this vulnerability can disrupt business processes and increase operational risk. Attackers with Subscriber-level access—often easy to obtain via registration or compromised accounts—can exploit this flaw, increasing the threat surface. The vulnerability also undermines the principle of least privilege and could be chained with other vulnerabilities for more severe attacks. Overall, the impact is moderate but significant for affected WordPress sites, especially those with multiple authenticated users and critical import dependencies.

Mitigation Recommendations

To mitigate CVE-2026-3550, organizations should take the following specific actions: 1) Immediately restrict user registrations and review existing user roles to minimize the number of low-privileged authenticated users who can access admin pages. 2) Temporarily disable or deactivate the RockPress plugin if import functionality is not critical or if the risk is unacceptable. 3) Monitor server performance and logs for unusual spikes in import-related AJAX requests that may indicate exploitation attempts. 4) Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting rockpress_import and related actions from low-privileged users. 5) Contact the vendor (firetree) for an official patch or update; apply it promptly once available. 6) As a longer-term fix, ensure that the plugin’s AJAX handlers enforce capability checks using current_user_can() before processing requests, and restrict the enqueueing of the 'rockpress-admin' script to appropriate admin pages and user roles only. 7) Educate site administrators about the risk of exposing nonces broadly and the importance of proper authorization checks in custom plugins. These steps go beyond generic advice by focusing on access control, monitoring, and temporary risk reduction until a patch is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-04T18:46:43.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0b4ce32a4fbe5f4933bf

Added to database: 3/20/2026, 8:54:36 AM

Last enriched: 3/20/2026, 9:09:12 AM

Last updated: 3/20/2026, 9:56:08 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses