Linksy Search and Replace Vulnerability (High) – CVE-2026-2941

Linksy Search and Replace Vulnerability (High) – CVE-2026-2941

by | Mar 20, 2026 | Plugins

Attack Vectors

Linksy Search and Replace (slug: linksy-search-and-replace) has a High severity vulnerability (CVSS 8.8, CVE-2026-2941) that can be exploited by an authenticated user with Subscriber-level access or higher.

That means the risk is most relevant to WordPress sites where any kind of login is available to non-staff users, such as newsletter/community registrations, event portals, customer accounts (eCommerce), partner extranets, membership content, or even temporary accounts created for agencies and contractors.

Because the CVSS vector indicates no user interaction is required (UI:N) and the attack can be performed over the network (AV:N), an attacker who obtains (or creates) a low-privilege account can potentially execute the attack quickly and repeatedly.

Security Weakness

The vulnerability is caused by a missing capability (authorization) check in the plugin function linksy_search_and_replace_item_details in versions up to and including 1.0.4.

As reported by Wordfence, this missing authorization enables an authenticated attacker (Subscriber+) to perform arbitrary database updates, including updating any database table and any value. Critically, it includes the ability to modify the wp_capabilities field, allowing an attacker to escalate privileges by changing their role to administrator.

Remediation note: There is no known patch available at this time. Risk decisions should be made based on your organization’s tolerance and exposure, and it may be best to uninstall the affected software and replace it.

Technical or Business Impacts

If an attacker can elevate to administrator, they can typically take actions that affect confidentiality, integrity, and availability, which aligns with the CVSS impact ratings (C:H/I:H/A:H). In business terms, this can translate into site defacement, unauthorized content or link changes, malicious redirects, and persistent backdoors that survive password resets.

For marketing and revenue teams, the immediate risks often include brand damage (malicious content visible to customers), SEO and campaign disruption (spam links, redirect chains, poisoned landing pages), and lost conversion due to downtime or browser/security warnings. For executives and compliance teams, the bigger issue is that database-level manipulation can undermine the integrity of customer data and audit trails—raising incident response costs and potentially triggering contractual and regulatory reporting obligations depending on what data is exposed or altered.

Recommended mitigation options (given no patch is available): consider removing Linksy Search and Replace from production, restricting or disabling public registration where feasible, reviewing all Subscriber-level accounts for legitimacy, and increasing monitoring for unexpected admin creation, role changes, and edits to critical WordPress tables/values (for example, user roles/capabilities and core site configuration). Ensure you have recent, tested backups so you can restore quickly if tampering is detected.

Similar attacks (real-world examples): unauthorized or low-friction website changes and escalations are a common pattern in WordPress security incidents. Examples include WordPress REST API content injection (CVE-2017-1001000), WooCommerce SQL injection leading to data compromise (CVE-2021-34646), and WP File Manager leading to full site takeover via remote code execution (CVE-2020-25213).

Source for this vulnerability: Wordfence Threat Intelligence.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers