WordPress Vulnerability (Medium) –

WordPress Vulnerability (Medium) –

by | Mar 10, 2026 | Core

Attack Vectors

This medium-severity issue (CVSS 4.3) affects WordPress core versions up to and including 6.9.1. It can be exploited by an authenticated user with at least Author-level access (i.e., someone who can log in and create/edit content).

An attacker can use WordPress’s built-in AJAX media query functionality—specifically the query-attachments endpoint—to retrieve media attachment data and infer information about the posts those attachments belong to. No victim interaction is required once the attacker has access.

Security Weakness

The root cause is a missing authorization (capability) check in the wp_prepare_attachment_for_js() function for the uploadedToTitle and uploadedToLink fields. When WordPress prepares attachment details for the Media Library and returns them via the query-attachments AJAX response, it includes the parent post’s title without verifying the current user has read_post permission for that parent post.

As a result, authenticated users who should not be able to see details of private, draft, or otherwise restricted posts may still be able to discover those post titles through attachment queries.

Remediation: update WordPress to 6.8.4 or 6.9.2 (or any newer patched release) to address the missing capability check.

Technical or Business Impacts

While this vulnerability does not expose full post content, the disclosure of restricted post titles can still create meaningful business risk. Titles often contain sensitive context—such as upcoming campaign names, product launches, M&A initiatives, incident-response notes, or client-specific work—that can be valuable to a competitor or harmful if leaked.

For marketing and executive stakeholders, the practical impact is increased information leakage from inside the CMS. Even limited disclosure can undermine embargoed announcements, compromise confidential planning, and create compliance concerns if titles include regulated or customer-identifiable details. Because exploitation requires only low privileges (an authenticated Author+ account), the risk is higher in environments with many contributors, agencies, contractors, or shared logins.

Similar Attacks

Authorization failures (including missing capability checks and IDOR-style access control gaps) are a common source of real-world data exposure and unauthorized actions. Examples include:

CVE-2017-5487 (WordPress REST API content injection due to authorization handling)
CVE-2023-0669 (GoAnywhere MFT authentication bypass exploited for unauthorized access)
CVE-2019-11510 (Pulse Secure VPN arbitrary file read used to expose sensitive information)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers