Addi – Cuotas que se adaptan a ti Vulnerability (Medium) – CVE-2026…

Addi – Cuotas que se adaptan a ti Vulnerability (Medium) – CVE-2026…

by | Mar 19, 2026 | Plugins

Attack Vectors

The WordPress plugin Addi – Cuotas que se adaptan a ti (slug: buy-now-pay-later-addi) is affected by a Medium-severity vulnerability (CVSS 5.3) that can be exploited remotely over the network. Because the issue is described as exploitable by unauthenticated attackers, an attacker would not need a user account to attempt abuse.

In practical business terms, this type of exposure increases risk on sites where the plugin is installed and reachable from the public internet—especially if the affected functionality is accessible via common WordPress endpoints (e.g., plugin-exposed actions). The vulnerability record indicates no user interaction is required, which can make opportunistic scanning and exploitation more likely.

Security Weakness

CVE-2026-27073 is a missing authorization / missing capability check issue in Addi – Cuotas que se adaptan a ti affecting all versions up to and including 2.0.4. In WordPress terms, this typically means a function intended only for authorized roles (such as administrators or shop managers) does not properly verify permissions before performing an action.

The published advisory states that this weakness allows unauthenticated attackers to perform an unauthorized action, but it does not specify the exact action in the summary. As a result, risk assessment should focus on the fact that a publicly reachable, permissionless pathway exists and could be used to alter behavior or configuration depending on what the vulnerable function controls.

Remediation note: The source indicates no known patch is available at this time. Organizations should review the vulnerability details and determine mitigations based on risk tolerance; for many businesses, the safest path is to uninstall the affected plugin and replace it with an alternative solution.

Technical or Business Impacts

Even at Medium severity, a missing authorization control can create meaningful business risk. If an attacker can trigger unauthorized actions, the impacts may include unapproved changes that affect checkout flows, customer experience, or operational stability. For ecommerce and lead-generation sites, any unexpected behavior can translate into lost revenue, increased support volume, and reduced trust—particularly if payment or “buy now, pay later” messaging is impacted.

From a governance and compliance standpoint (CEO/CFO/COO/Compliance), this vulnerability also raises concerns around change control and integrity of web operations. If a public-facing system can be modified without authentication, it may increase exposure to fraud scenarios, reporting errors, or audit findings—especially if site behavior impacts customer transactions, disclosures, or records.

Recommended risk actions (given no known patch): inventory where Addi – Cuotas que se adaptan a ti is installed; consider disabling/uninstalling the plugin until a fix exists; restrict administrative access and monitor for unexpected site changes; and ensure you have recent backups and a rollback plan for rapid recovery.

Similar attacks: Missing authorization and access-control failures have repeatedly led to real-world incidents and regulatory scrutiny. Examples include the Equifax breach (2017), where an unpatched internet-facing system contributed to a major compromise, and the Capital One incident (2019), which involved misconfigurations and access control weaknesses impacting sensitive data exposure.

For reference, the CVE record is available here: CVE-2026-27073. Source advisory: Wordfence vulnerability entry.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers