PowerPress Podcasting plugin by Blubrry Vulnerability (High) – CVE-…

PowerPress Podcasting plugin by Blubrry Vulnerability (High) – CVE-…

by | Mar 5, 2026 | Plugins

Attack Vectors

The PowerPress Podcasting plugin by Blubrry (slug: powerpress) is affected by a High-severity vulnerability (CVE-2026-23798, CVSS 7.5) in versions up to and including 11.15.10. The issue can be triggered by an authenticated WordPress user with Contributor-level access or higher.

From a business perspective, this matters because “Contributor+” accounts are often granted to internal staff, agencies, freelancers, or partners to publish or manage content. If one of those accounts is compromised (or misused), an attacker may be able to attempt exploitation over the network without requiring a victim to click anything.

Important constraint: the vulnerable behavior involves deserialization of untrusted input, but there is no known usable “POP chain” in the affected plugin itself. That means real-world impact depends on whether another installed plugin or theme provides the missing ingredients an attacker could leverage.

Security Weakness

CVE-2026-23798 is described as a PHP Object Injection weakness caused by deserialization of untrusted input in PowerPress Podcasting plugin by Blubrry versions <= 11.15.10. In plain terms, the plugin can be made to accept and process a specially crafted payload from a logged-in user, potentially allowing unintended actions inside the site’s code execution flow.

However, the vulnerability’s impact is conditional. The source notes that PowerPress does not include a known POP chain, so the vulnerability has no practical impact unless your WordPress environment also includes another plugin or theme that contains a POP chain an attacker can use.

Remediation is straightforward: update PowerPress to version 11.15.11 or a newer patched release.

Technical or Business Impacts

If your WordPress site has an additional plugin or theme installed that provides a usable POP chain, the risk escalates significantly. In that situation, an authenticated attacker (Contributor+) could potentially turn this weakness into high-impact outcomes consistent with the CVSS rating: exposure of sensitive information, unauthorized changes to site content or settings, or disruption of site availability.

For marketing leadership and executives, the most relevant business risks include brand damage from defaced pages or malicious redirects, loss of customer trust if data is exposed, and revenue impact if the site is taken offline during a campaign or peak traffic window. There is also potential compliance and legal exposure if regulated data is involved or if incident disclosure obligations are triggered.

Priority action: confirm whether you are running PowerPress Podcasting plugin by Blubrry 11.15.10 or earlier, and update to 11.15.11+ promptly. Also review who has Contributor (or higher) access—especially third parties—and ensure accounts use strong authentication practices.

Similar Attacks

PHP object injection and insecure deserialization flaws have been used in real-world WordPress incidents, particularly when attackers can chain multiple weaknesses together. Examples:

WP GDPR Compliance plugin 0-day exploited in the wild (Wordfence)

File Manager plugin vulnerabilities leading to serious site compromise (Wordfence)

CISA Known Exploited Vulnerabilities (KEV) catalog illustrating how plugin flaws get operationalized

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers