Visual Link Preview Vulnerability (Medium) – CVE-2026-24984

Visual Link Preview Vulnerability (Medium) – CVE-2026-24984

by | Feb 10, 2026 | Plugins

Attack Vectors

The vulnerability CVE-2026-24984 affects the WordPress plugin Visual Link Preview (slug: visual-link-preview) in versions 2.2.9 and earlier. It is rated Medium severity (CVSS 4.3) and involves a “missing authorization” issue.

The most relevant entry point is your WordPress login: an attacker must already have an authenticated account with at least Contributor-level access (or higher). In practical terms, this risk increases for organizations with many internal users, agencies, contractors, or partners who have CMS accounts, as well as sites that allow user registration.

Because this issue is described as a missing capability check on a function, the main concern is that a logged-in user who should not be allowed to perform a specific action may be able to do so anyway.

Security Weakness

Visual Link Preview contains a missing capability check in versions up to and including 2.2.9. Capability checks are the controls WordPress uses to ensure only the right roles can perform sensitive actions.

When those checks are missing, the site can unintentionally treat lower-privileged users as if they have higher permissions for that specific function. In this case, the published details indicate that authenticated attackers with Contributor-level access and above can perform an unauthorized action, even though they should not be permitted to do so.

Severity is Medium, with the CVSS vector indicating low attack complexity and no user interaction required once the attacker is logged in (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). While the impact is described as limited to integrity changes (not confidentiality or availability), it can still create meaningful business risk.

Technical or Business Impacts

Even at Medium severity, a missing authorization issue can create real-world outcomes that matter to executives and compliance teams. If an authenticated Contributor (or higher) can perform an unauthorized action, it can undermine your internal controls and approval workflows in WordPress.

Business impacts may include: unapproved changes that affect brand presentation, campaign landing pages, or marketing messaging; increased time spent on incident response and content review; and reduced confidence in your governance model for who can change what on the site.

Compliance and audit impacts: if your organization relies on role-based access and change control evidence, any weakness that enables actions outside intended permissions can become an audit finding or trigger additional compensating controls.

Remediation: update Visual Link Preview to version 2.3.0 or newer (patched). Reference: Wordfence vulnerability record.

Similar Attacks

Authorization and access-control weaknesses are a common cause of WordPress site compromise, especially in environments with many user accounts or third-party contributors. Attackers routinely look for ways to take actions that exceed their intended permissions.

For additional context on how access-control issues show up in the real world, see these examples:

CVE-2024-27956 (WordPress plugin-related vulnerability record)
CVE-2023-2986 (WordPress plugin-related vulnerability record)
CISA Known Exploited Vulnerabilities (KEV) Catalog

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers