HUMN-1 AI Website Scanner & Human Certification by Winston AI Vulne…

HUMN-1 AI Website Scanner & Human Certification by Winston AI Vulne…

by | Mar 6, 2026 | Plugins

Attack Vectors

HUMN-1 AI Website Scanner & Human Certification by Winston AI (WordPress plugin slug: winston-ai-wp) has a Medium severity vulnerability (CVSS 4.3, CVE-2026-1981) affecting versions 0.0.3 and earlier. The issue can be triggered by an authenticated user with Subscriber-level access or higher over the network, without needing user interaction.

In practical terms, any account that can log into WordPress at the Subscriber tier (or above)—including legitimate low-privilege users, compromised accounts, or accounts created through weak registration controls—could use a built-in AJAX action to reset the plugin’s API connection settings.

Security Weakness

The vulnerability is caused by a missing authorization (capability) check in the plugin’s winston_disconnect() function. Because the authorization check is not properly enforced, a low-privilege authenticated user can invoke the winston_disconnect AJAX action and reset the plugin’s API connection settings even if they should not have administrative control.

This is a classic “permission boundary” failure: the WordPress role system is in place, but the vulnerable function does not sufficiently validate whether the logged-in user is allowed to perform this sensitive action.

Technical or Business Impacts

Operational disruption and integrity risk: Resetting the plugin’s API connection settings can interrupt or degrade the expected operation of HUMN-1 AI Website Scanner & Human Certification by Winston AI, potentially creating gaps in scanning/certification workflows and delaying site assurance activities.

Increased support and downtime costs: Marketing and web teams may spend time troubleshooting “mysterious” disconnections, re-authenticating integrations, and restoring settings—time that competes with campaigns, content releases, and revenue activities.

Compliance and audit friction: For organizations that rely on consistent website scanning/certification signals as part of governance or vendor requirements, unexpected resets can create documentation gaps, missed checkpoints, or difficult-to-explain changes during reviews.

Recommended action: Update the plugin to version 0.0.4 or newer, which includes a patch for this issue. For reference, see the public CVE record: CVE-2026-1981 and the source advisory: Wordfence vulnerability entry.

Similar Attacks

Authorization gaps that allow low-privilege users to change settings are a recurring theme in WordPress plugin security. These incidents show how quickly “small” permission issues can become operational problems:

Essential Addons for Elementor – unauthorized access vulnerabilities (Wordfence)

File Manager plugin – high-impact vulnerability and exploitation (Wordfence)

WP Super Cache – patched vulnerability with broad site risk (Wordfence)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers