Search & Go – Directory WordPress Theme Vulnerability (High) – CVE-…

Search & Go – Directory WordPress Theme Vulnerability (High) – CVE-…

by | Mar 19, 2026 | Themes

Attack Vectors

CVE-2026-24971 affects the Search & Go – Directory WordPress Theme (slug: searchgo) in versions 2.8 and below. The primary attack vector is authenticated access: an attacker only needs a valid WordPress account with Subscriber-level privileges or higher to attempt exploitation.

Because this is a network-reachable issue (CVSS:3.1 AV:N) with low complexity (AC:L) and no user interaction required (UI:N), organizations running public registration, member portals, customer logins, job boards, or directory listings are more exposed to real-world abuse.

Security Weakness

This is a Privilege Escalation vulnerability in Search & Go (severity: High, CVSS score: 8.8; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). In affected versions, an authenticated attacker can potentially elevate their role to Administrator.

In practical terms, this weakness breaks a core security assumption in WordPress: that lower-privileged users (like Subscribers) cannot gain site-wide control. Once an attacker reaches Administrator, most standard WordPress safeguards at the application level are effectively bypassed.

Technical or Business Impacts

If exploited, CVE-2026-24971 can result in full administrative takeover of the WordPress site. Business impacts may include defacement, malicious redirects that harm brand trust and campaign performance, publishing fraudulent content, disabling security plugins, creating hidden admin accounts for persistence, and exposing or altering data accessible within the WordPress environment.

From a revenue and operations standpoint, an admin-level compromise can disrupt lead generation, directory listings, paid memberships, and SEO performance. It can also trigger incident response costs, downtime, customer support volume, and potential compliance concerns if personal data is accessed or modified.

Remediation: Update Search & Go – Directory WordPress Theme to version 2.8.1 or a newer patched version. Reference: Wordfence advisory. CVE record: CVE-2026-24971.

Similar attacks: Privilege escalation has been a recurring WordPress risk category, including historical examples in WordPress core such as CVE-2019-8942, where authenticated users could escalate impact through improper handling of user-supplied data.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers