CVE-2026-3651: CWE-862 Missing Authorization in hakeemnala Build App Online
The Build App Online plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.23. This is due to the plugin registering the 'build-app-online-update-vendor-product' AJAX action via wp_ajax_nopriv_ without proper authentication checks, capability verification, or nonce validation in the update_vendor_product() function. The function accepts a user-supplied post ID from the request and calls wp_update_post() to modify the post_author field without validating whether the user has permission to modify the specified post. This makes it possible for unauthenticated attackers to modify the post_author of arbitrary posts to 0 (orphaning posts from their legitimate authors), or for authenticated attackers to claim ownership of any post by setting themselves as the author.
AI Analysis
Technical Summary
The Build App Online plugin for WordPress suffers from a missing authorization vulnerability identified as CVE-2026-3651. This issue exists in all versions up to and including 1.0.23. The root cause is the registration of the AJAX action 'build-app-online-update-vendor-product' via the wp_ajax_nopriv_ hook, which allows unauthenticated users to invoke the update_vendor_product() function. This function accepts a post ID from the request and calls wp_update_post() to modify the post_author field without verifying if the requester has the necessary permissions to modify that post. The lack of authentication checks, capability verification, and nonce validation means that unauthenticated attackers can change the author of any post to 0, effectively orphaning the post and removing legitimate author ownership. Authenticated attackers can exploit this to claim ownership of posts by setting themselves as the author. This vulnerability falls under CWE-862 (Missing Authorization). While it does not impact confidentiality or availability, it compromises data integrity by allowing unauthorized modification of post ownership. No patches or mitigations are currently linked, and no known exploits have been reported in the wild. The CVSS v3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and no availability impact.
Potential Impact
This vulnerability allows attackers to modify the post_author field of arbitrary WordPress posts without authorization. For unauthenticated attackers, this can orphan posts by setting the author to 0, potentially disrupting content management, auditing, and ownership tracking. For authenticated attackers, it enables privilege escalation by claiming ownership of posts they do not own, which can lead to unauthorized content editing, deletion, or publication under their identity. This undermines content integrity and trustworthiness on affected WordPress sites. Organizations relying on the Build App Online plugin risk content tampering, loss of author accountability, and potential misuse of content management workflows. Although it does not directly expose sensitive data or cause denial of service, the integrity compromise can have reputational and operational impacts, especially for sites with multiple authors or strict content governance. The ease of exploitation (no authentication required for some attacks) increases risk, particularly for public-facing WordPress sites using this plugin.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Disable or remove the Build App Online plugin if it is not essential. 2) Restrict access to the AJAX endpoint 'build-app-online-update-vendor-product' by configuring web application firewalls (WAFs) or server rules to block unauthenticated requests to this action. 3) Implement custom code or hooks to validate user capabilities before allowing post_author modifications via this plugin’s AJAX calls. 4) Monitor WordPress logs for suspicious calls to this AJAX action and unexpected changes in post authorship. 5) Limit plugin usage to trusted users and environments with strict access controls. 6) Once available, promptly apply official patches or updates from the plugin vendor. 7) Conduct regular audits of post authorship to detect unauthorized changes. These steps go beyond generic advice by focusing on controlling access to the vulnerable AJAX action and monitoring for exploitation attempts.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2026-3651: CWE-862 Missing Authorization in hakeemnala Build App Online
Description
The Build App Online plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.23. This is due to the plugin registering the 'build-app-online-update-vendor-product' AJAX action via wp_ajax_nopriv_ without proper authentication checks, capability verification, or nonce validation in the update_vendor_product() function. The function accepts a user-supplied post ID from the request and calls wp_update_post() to modify the post_author field without validating whether the user has permission to modify the specified post. This makes it possible for unauthenticated attackers to modify the post_author of arbitrary posts to 0 (orphaning posts from their legitimate authors), or for authenticated attackers to claim ownership of any post by setting themselves as the author.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Build App Online plugin for WordPress suffers from a missing authorization vulnerability identified as CVE-2026-3651. This issue exists in all versions up to and including 1.0.23. The root cause is the registration of the AJAX action 'build-app-online-update-vendor-product' via the wp_ajax_nopriv_ hook, which allows unauthenticated users to invoke the update_vendor_product() function. This function accepts a post ID from the request and calls wp_update_post() to modify the post_author field without verifying if the requester has the necessary permissions to modify that post. The lack of authentication checks, capability verification, and nonce validation means that unauthenticated attackers can change the author of any post to 0, effectively orphaning the post and removing legitimate author ownership. Authenticated attackers can exploit this to claim ownership of posts by setting themselves as the author. This vulnerability falls under CWE-862 (Missing Authorization). While it does not impact confidentiality or availability, it compromises data integrity by allowing unauthorized modification of post ownership. No patches or mitigations are currently linked, and no known exploits have been reported in the wild. The CVSS v3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and no availability impact.
Potential Impact
This vulnerability allows attackers to modify the post_author field of arbitrary WordPress posts without authorization. For unauthenticated attackers, this can orphan posts by setting the author to 0, potentially disrupting content management, auditing, and ownership tracking. For authenticated attackers, it enables privilege escalation by claiming ownership of posts they do not own, which can lead to unauthorized content editing, deletion, or publication under their identity. This undermines content integrity and trustworthiness on affected WordPress sites. Organizations relying on the Build App Online plugin risk content tampering, loss of author accountability, and potential misuse of content management workflows. Although it does not directly expose sensitive data or cause denial of service, the integrity compromise can have reputational and operational impacts, especially for sites with multiple authors or strict content governance. The ease of exploitation (no authentication required for some attacks) increases risk, particularly for public-facing WordPress sites using this plugin.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Disable or remove the Build App Online plugin if it is not essential. 2) Restrict access to the AJAX endpoint 'build-app-online-update-vendor-product' by configuring web application firewalls (WAFs) or server rules to block unauthenticated requests to this action. 3) Implement custom code or hooks to validate user capabilities before allowing post_author modifications via this plugin’s AJAX calls. 4) Monitor WordPress logs for suspicious calls to this AJAX action and unexpected changes in post authorship. 5) Limit plugin usage to trusted users and environments with strict access controls. 6) Once available, promptly apply official patches or updates from the plugin vendor. 7) Conduct regular audits of post authorship to detect unauthorized changes. These steps go beyond generic advice by focusing on controlling access to the vulnerable AJAX action and monitoring for exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-06T16:26:41.553Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69be1810f4197a8e3b7843b7
Added to database: 3/21/2026, 4:01:20 AM
Last enriched: 3/21/2026, 4:20:38 AM
Last updated: 3/22/2026, 5:03:34 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.