Advanced Country Blocker Vulnerability (Medium) – CVE-2026-1675

Advanced Country Blocker Vulnerability (Medium) – CVE-2026-1675

by | Feb 12, 2026 | Plugins

Attack Vectors

CVE-2026-1675 affects the Advanced Country Blocker WordPress plugin (slug: advanced-country-blocker) in versions 2.3.1 and below, and is rated Medium severity (CVSS 5.3). The issue stems from an insecure default “secret bypass key” created during installation.

In practical terms, an unauthenticated attacker can attempt to bypass your site’s geolocation-based blocking by appending the bypass key to a URL. This only works on sites where an administrator has not changed the default value, but when it does, the attacker may be able to reach pages that would otherwise be blocked by country restrictions.

Security Weakness

The core weakness is an authorization bypass caused by a predictable default secret key that may remain unchanged after installation. When a security control relies on a “secret” that is not truly secret (for example, a default value that can be guessed or commonly known), it can undermine the purpose of the control.

This vulnerability is not about breaking passwords or exploiting user accounts; it is about circumventing a specific protective mechanism (country-based access restrictions) when the bypass key is left at its default value.

Technical or Business Impacts

Business risk: If you use Advanced Country Blocker to reduce exposure to unwanted traffic, enforce geo-specific policies, or support compliance controls, an authorization bypass can erode the reliability of that control. That can translate into increased risk tolerance without realizing it—especially if teams assume the block is absolute.

Operational impact: Successful bypass may lead to higher volumes of unwanted visits from regions you intended to restrict, potentially increasing fraud attempts, abusive traffic, or support burden. If geo-blocking is part of your incident response playbook (for example, limiting access during a spike in malicious activity), this weakness may reduce the effectiveness of that rapid mitigation step.

Recommended remediation: Update Advanced Country Blocker to version 2.3.2 or newer, which includes a fix for this issue, per the published advisory. You can review the source details here: Wordfence vulnerability record and the CVE entry here: CVE-2026-1675.

Similar Attacks

Default or predictable secrets are a common root cause behind real-world security incidents because they turn “restricted” functionality into something an outsider can access with minimal effort. Examples include:

CISA Advisory AA21-110A (Compromise of U.S. Water Treatment Facility) — highlights how weak/default credentials and poor access controls can contribute to serious operational risk.
CERT VU#228519 (Mirai botnet) — documented exploitation of default credentials across IoT devices, demonstrating how widespread and damaging “unchanged defaults” can be.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers