WP Popups – WordPress Popup builder Vulnerability (Medium) – CVE-20…

WP Popups – WordPress Popup builder Vulnerability (Medium) – CVE-20…

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-24616 is a Medium severity missing authorization issue (CVSS 4.3) affecting WP Popups – WordPress Popup builder (slug: wp-popups-lite) in versions up to and including 2.2.0.5.

The risk is primarily from authenticated users who already have some level of access to your WordPress site—specifically, users with contributor-level access or higher. Because the plugin is missing a required capability check on a function, a logged-in attacker can trigger an action they should not be allowed to perform.

This matters in real-world business settings where multiple internal teams, contractors, agencies, or guest authors have accounts. Even if you trust your users, account takeover (via password reuse or phishing) can turn an ordinary contributor account into an attacker foothold.

Security Weakness

The core weakness is missing authorization (capability) validation in the WP Popups plugin versions ≤ 2.2.0.5. In practical terms, the plugin does not consistently confirm that the current user has the correct permission to perform a sensitive action.

Because this issue requires only low privileges (PR:L in the CVSS vector) and no user interaction (UI:N), it can be exploited more easily than issues that require administrator access or tricking someone into clicking something.

Reference: CVE-2026-24616 record. Additional details are available from the source advisory: Wordfence vulnerability entry.

Technical or Business Impacts

While the CVSS indicates no direct confidentiality or availability impact (C:N/A:N), there is an integrity impact (I:L). That generally translates to unauthorized changes being possible within the plugin’s scope. For marketing and leadership teams, the practical risk is unwanted modifications that could affect on-site campaigns, messaging, or user experience.

Potential business outcomes can include: brand damage from incorrect or malicious popups, reduced conversion rates due to disrupted campaigns, internal compliance concerns if site experiences are altered without approval, and incident response costs if you must investigate whether changes were legitimate.

Recommended remediation: update WP Popups to version 2.2.0.6 or newer (patched). After updating, review user roles (especially contributor accounts), confirm least-privilege access, and audit recent changes to popup configurations to ensure they were authorized.

Similar Attacks

Missing authorization and permission-check flaws are a common root cause in WordPress plugin incidents, because they allow lower-privileged users to do actions intended only for admins. Public examples include:

CVE-2023-27372 (BuddyForms)
CVE-2023-2986 (Essential Addons for Elementor)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers