WebPurify Profanity Filter Vulnerability (Medium) – CVE-2026-0572

WebPurify Profanity Filter Vulnerability (Medium) – CVE-2026-0572

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-0572 is a Medium severity vulnerability (CVSS 6.5) affecting the WebPurify Profanity Filter WordPress plugin (slug: webpurifytextreplace) in versions 4.0.2 and earlier. The issue allows an unauthenticated attacker to change plugin settings over the network without needing a user account or any user interaction.

From a business-risk perspective, this kind of exposure matters because it can be exploited quietly. If the plugin is installed and exposed, an attacker may attempt to alter profanity filtering or related configuration settings to disrupt normal site operations, degrade the customer experience, or create moderation and brand-safety issues.

Security Weakness

The root cause is a missing authorization (capability) check in the plugin function webpurify_save_options. In practical terms, the plugin does not sufficiently verify that a request to change settings is coming from a legitimate, authorized WordPress administrator (or other approved role).

Because this check is missing, the plugin’s settings-change functionality can be reached by someone who is not logged in. The vulnerability is limited to unauthorized modification of plugin settings (not a confirmed data breach), but it still represents a meaningful control failure for teams responsible for compliance, brand safety, and operational reliability.

Technical or Business Impacts

The most direct impact is loss of integrity and availability for the affected plugin’s configuration (aligned with the CVSS vector indicating low integrity and low availability impact). For marketing leaders and executives, this can translate into measurable business risk: brand-damaging content slipping through moderation controls, inconsistent customer experiences, increased support burden, and potential disruption to campaigns that rely on user-generated content or automated filtering.

For compliance and risk stakeholders, unauthorized settings changes can complicate auditability and policy enforcement. Even if no sensitive data is exposed, the ability for an outside party to alter operational controls is a governance concern—especially on high-visibility pages or regulated workflows.

Remediation: Update WebPurify Profanity Filter to version 4.0.3 or a newer patched version. Track the CVE record here: https://www.cve.org/CVERecord?id=CVE-2026-0572. Reference source: Wordfence vulnerability intelligence.

Similar Attacks

Unauthenticated or weakly protected WordPress plugin endpoints have been repeatedly used to change settings, create disruptive site behavior, or open the door to additional abuse. A few well-documented examples include:

Yellow Pencil Visual Theme Customizer (actively exploited; Wordfence report)
Elementor (high-impact vulnerability discussion; Wordfence report)
ThemeGrill Demo Importer (critical plugin vulnerabilities; Wordfence report)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers