Virusdie – One-click website security Vulnerability (Medium) – CVE-…

Virusdie – One-click website security Vulnerability (Medium) – CVE-…

by | Feb 18, 2026 | Plugins

Attack Vectors

The Virusdie – One-click website security WordPress plugin (slug: virusdie) has a Medium-severity vulnerability (CVE-2025-14864, CVSS 4.3) affecting versions up to and including 1.1.7.

An attacker must be able to log in to your WordPress site with at least a Subscriber account (or any higher role). From there, they can request the plugin’s API key via a built-in WordPress AJAX endpoint and retrieve it without needing elevated administrative access.

This risk is most relevant for organizations that allow user registration, run membership or community features, provide customer portals, or have many internal accounts (e.g., marketing, agencies, contractors) where “low-privilege” access is common.

Security Weakness

The issue is a missing authorization check in the plugin’s API-key retrieval function (vd_get_apikey) exposed through the WordPress AJAX action (wp_ajax_virusdie_apikey).

In business terms: the plugin provides a way to fetch a sensitive credential (the Virusdie API key), but it does not sufficiently restrict that action to only trusted roles. As a result, authenticated users who should not have access can still obtain it.

Vendor guidance indicates this is fixed in Virusdie 1.1.8 (or newer). Updating is the primary remediation step.

Technical or Business Impacts

If the Virusdie API key is disclosed, it may enable access to the site owner’s Virusdie account. That can increase the likelihood of security controls being weakened, security data being exposed, or security settings being changed in ways that make future attacks easier.

For executives and compliance teams, the practical risks include: loss of confidence in security monitoring, potential exposure of security-related account information, increased incident-response costs, and added scrutiny during audits—especially if user registration is enabled and access is broadly distributed.

What to do now: update the Virusdie plugin to 1.1.8 or later, review who has WordPress accounts (especially Subscribers), and consider reducing unnecessary accounts or disabling public registration where it is not essential. Track this issue under CVE-2025-14864 and reference the vendor analysis at Wordfence.

Similar attacks: Authorization gaps in web and application APIs have led to high-profile exposures—for example, the Panera Bread customer data exposure tied to an insecure API, and the Uber incident where exposed credentials contributed to unauthorized access. While these are not WordPress-specific, they illustrate how credential or API access-control failures can quickly become a business-risk event.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers