Exploit Scanner Vulnerability (High) –

Exploit Scanner Vulnerability (High) –

by | Feb 26, 2026 | Plugins

Attack Vectors

Exploit Scanner (WordPress plugin slug: exploit-scanner) has a High severity vulnerability (CVSS 7.5, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) affecting versions up to and including 1.3.3.

The issue can be triggered remotely over the network and does not require authentication or user interaction. An unauthenticated attacker can directly request the plugin’s exploit-scanner.php file to potentially reveal otherwise restricted server path information.

Security Weakness

This is a Full Path Disclosure weakness. When certain files are accessed directly, application or server responses may expose the underlying full filesystem paths (for example, where WordPress and plugins reside on the server).

While Full Path Disclosure does not typically change content or take the site offline by itself, it can provide highly useful reconnaissance data that makes follow-on attacks easier and more targeted—especially against organizations with strict compliance requirements or public-facing brands.

Technical or Business Impacts

Information exposure risk: Revealed server paths can help attackers map your environment, identify hosting structures, and tailor exploitation attempts toward known weak points.

Higher probability of successful breach attempts: Even without direct data modification, exposed internal details can reduce attacker guesswork and shorten time-to-compromise when combined with other vulnerabilities.

Business and compliance implications: Marketing and executive teams should treat this as a risk to brand trust and operational continuity. In regulated environments, any unnecessary exposure of internal system details can complicate audit narratives and incident response obligations.

Remediation: Update Exploit Scanner to version 1.3.4 or a newer patched version as recommended by the vendor/community guidance.

Similar Attacks

Information disclosure vulnerabilities are commonly used as stepping stones in broader attack chains. Notable examples include:

Heartbleed (OpenSSL) — a major information disclosure flaw that exposed sensitive memory contents and drove widespread emergency patching.

Cloudbleed (Cloudflare memory leak) — an information exposure incident that demonstrated how leaked internal data can create serious downstream risk.

CISA alerting on Heartbleed — an example of how regulators and security authorities treat information disclosure as a material security risk requiring prompt mitigation.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers