JetEngine Vulnerability (High) – CVE-2026-28134

JetEngine Vulnerability (High) – CVE-2026-28134

by | Mar 5, 2026 | Plugins

Attack Vectors

High severity vulnerability CVE-2026-28134 affects the JetEngine WordPress plugin (slug: jet-engine) in versions 3.7.2 and earlier. It allows authenticated attackers with Contributor-level access or higher to execute code on the web server (Remote Code Execution).

For business leaders, the key takeaway is that this is not a purely “external hacker” scenario—risk increases when an attacker can obtain or misuse a legitimate lower-privilege account (for example, a compromised contributor login, a malicious insider, or a third-party partner account with posting access).

Security Weakness

The core weakness is a Remote Code Execution flaw in JetEngine that can be triggered by a user who is already logged in with Contributor+ permissions. In practical terms, this means an attacker does not need to rely on tricking a visitor or an administrator; they can potentially run server-side code once they have an account at the required role level.

This issue is rated High with a CVSS score of 8.8 (vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting that it can be exploited over the network with low complexity and can lead to serious outcomes for confidentiality, integrity, and availability.

Technical or Business Impacts

If exploited, this vulnerability can enable an attacker to run code on the server hosting your WordPress site, which can translate into major business disruption. Potential outcomes include website defacement, data exposure, unauthorized changes to site content, and service outages.

From a leadership perspective, the business risks can include brand damage (loss of customer trust after a public incident), marketing and sales disruption (downtime, broken campaigns, SEO impacts), financial loss (incident response, recovery costs, potential fraud), and compliance or legal exposure if sensitive data is accessed or altered.

Remediation: Update JetEngine to version 3.8.1.2 or a newer patched version as soon as possible. Reference: CVE-2026-28134 and Wordfence advisory.

Similar Attacks

Remote Code Execution (RCE) and plugin-related weaknesses have been central to several widely reported incidents impacting organizations and their online operations. Examples include:

CISA Alert (AA21-131A): Exploitation of Accellion FTA vulnerabilities — a reminder of how quickly attackers operationalize serious vulnerabilities to access systems and data.

CISA Alert: Targeted ransomware attacks — illustrates how footholds can escalate into operational outages and extortion, especially when attackers gain the ability to run code in a target environment.

CISA Advisory (AA21-200A): Exploitation of Microsoft Exchange Server vulnerabilities — demonstrates the business impact when attackers can execute actions on servers, leading to compromise at scale.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers