AWP Classifieds Vulnerability (Medium) – CVE-2026-24593

AWP Classifieds Vulnerability (Medium) – CVE-2026-24593

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2026-24593 affects the AWP Classifieds WordPress plugin (slug: another-wordpress-classifieds-plugin) in versions 4.4.3 and earlier. Because this is an unauthenticated information exposure issue, an attacker does not need a login to attempt to access data they should not be able to see.

From a business-risk perspective, this means the attack surface includes any public-facing site running the vulnerable plugin version—especially sites that allow classifieds submissions, user interactions, or store configuration data that could be valuable to an attacker.

Severity is rated Medium with a CVSS 5.3 score (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), indicating it can be reached over the network with low complexity and no required privileges.

Security Weakness

The underlying weakness is classified as Sensitive Information Exposure in AWP Classifieds versions up to and including 4.4.3. According to the published advisory, this weakness can allow unauthenticated attackers to extract sensitive user or configuration data.

While the exact data elements depend on how the site is configured, information exposure vulnerabilities commonly increase risk by revealing internal details that help attackers escalate to other attacks (for example, identifying users, discovering operational settings, or learning how parts of the site are structured).

Reference: CVE-2026-24593 record and the vendor/community advisory at Wordfence Threat Intel.

Technical or Business Impacts

Even at Medium severity, information exposure can create outsized business consequences. If sensitive user or configuration data is leaked, your organization may face privacy and compliance risk (depending on what is exposed), increased likelihood of targeted phishing, and potential brand damage if customers or partners lose trust.

Operationally, exposed configuration details can make other attacks easier by reducing an attacker’s guesswork. This can lead to additional remediation costs, emergency response time, and unplanned downtime for the marketing site or revenue-generating landing pages.

Recommended remediation: Update AWP Classifieds to version 4.4.4 or a newer patched version as stated in the advisory. After updating, confirm the vulnerable version is no longer present across production, staging, and any regional/microsite installations that may be maintained by different teams or agencies.

Similar Attacks

Information exposure is a common root cause in real-world incidents, often resulting from weaknesses that unintentionally reveal sensitive data to the public internet. Examples include:

Capital One (2019) data theft affecting over 100 million customers (U.S. Department of Justice)
Microsoft Power Apps data leak reports (UpGuard)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers