WPAdverts – Classifieds Plugin Vulnerability (Medium) – CVE-2026-27092

WPAdverts – Classifieds Plugin Vulnerability (Medium) – CVE-2026-27092

by | Apr 15, 2026 | Plugins

Attack Vectors

WPAdverts – Classifieds Plugin (slug: wpadverts) is affected by CVE-2026-27092, a Medium-severity issue (CVSS 4.3, vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) in versions <= 2.3.0.

The attack requires a valid WordPress login. An authenticated user with contributor-level access or higher could trigger the vulnerable function over the network without needing additional user interaction, enabling an unauthorized action within the plugin’s functionality.

Organizations are most exposed when they have many internal users, agencies, contractors, or community contributors who have logins (even limited ones), because the risk is tied to who has accounts rather than whether the site is publicly accessible.

Security Weakness

The underlying weakness is a missing capability (authorization) check in a plugin function in WPAdverts – Classifieds Plugin versions up to and including 2.3.0. In practical terms, the plugin does not adequately verify whether the logged-in user is allowed to perform a specific action before processing the request.

While the issue is rated Medium and does not indicate data exposure (per the CVSS vector, confidentiality impact is None), it can still create avoidable operational and governance risk because it allows actions to be performed by users who should not be able to perform them.

Remediation: Update WPAdverts – Classifieds Plugin to 2.3.1 or a newer patched version. Reference: Wordfence vulnerability advisory. CVE record: CVE-2026-27092.

Technical or Business Impacts

The primary business risk is unauthorized changes performed by authenticated users who are not supposed to have that level of control. Even when the direct impact is “only” integrity-related (as indicated by the CVSS vector), the downstream effects can be significant: disrupted site operations, moderation overhead, internal investigation time, and reputational risk if marketplace/classified content is affected.

For leadership and compliance teams, this is also an access control and governance concern. If contractors, agencies, or temporary staff have accounts, a missing authorization check increases the likelihood of policy violations (intentional or accidental) and complicates auditability around “who can do what” in customer-facing workflows.

From a marketing and revenue perspective, unauthorized actions in a classifieds workflow can undermine trust in listings, increase support burden, and create friction for legitimate buyers and sellers—directly impacting conversion and brand credibility.

Similar Attacks

WordPress plugin vulnerabilities have a long history of being abused at scale, especially when they enable unauthorized actions or insufficient access control. For example, the WP File Manager plugin vulnerability (CVE-2020-25213) was widely reported as being exploited to compromise websites.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers