Video Conferencing with Zoom Vulnerability (Medium) – CVE-2026-1368

Video Conferencing with Zoom Vulnerability (Medium) – CVE-2026-1368

by | Feb 24, 2026 | Plugins

Attack Vectors

Video Conferencing with Zoom (WordPress plugin slug: video-conferencing-with-zoom-api) is affected by CVE-2026-1368, rated Medium severity (CVSS 5.3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

The risk is driven by the fact that an attacker does not need an account (no privileges required) and does not need user interaction. This makes the vulnerability reachable through routine internet-facing traffic to your WordPress site, especially if the affected plugin is installed and active.

Security Weakness

According to Wordfence, versions up to and including 4.6.6 are vulnerable due to a missing capability (authorization) check on a function. In plain terms, the plugin fails to reliably confirm that a request is coming from a permitted WordPress user role before executing an action.

This type of control gap is often categorized as an authorization weakness: the site may accept and process certain requests even when they originate from an unauthenticated party.

References: CVE-2026-1368 and Wordfence advisory source: Wordfence Threat Intel.

Technical or Business Impacts

The published CVSS details indicate no direct confidentiality impact and no availability impact, with a low integrity impact. Practically, that means the primary business concern is unauthorized changes (for example, actions that could affect how the plugin behaves or interacts with your site), rather than data theft or full site outage.

For marketing and executive stakeholders, the key risk is trust and operational integrity: unauthorized actions—however limited—can still create brand risk (unexpected site behavior), compliance concerns (unapproved changes in customer-facing systems), and avoidable internal cost (investigation, rollback, and incident reporting).

Remediation note: there is no known patch available at this time. Based on your risk tolerance, the most risk-reducing option may be to uninstall the affected plugin and replace it. If replacement is not immediately possible, consider compensating controls such as tightening exposure of the WordPress site where feasible (e.g., protective filtering/WAF “virtual patching,” enhanced monitoring for unexpected changes, and restricting access paths to administrative and sensitive site functions).

Similar Attacks

Authorization gaps that allow unauthenticated users to access functionality or data are a recurring pattern across CMS platforms. One example is CVE-2023-23752, an unauthenticated access issue affecting Joomla! that enabled public requests to retrieve sensitive information in certain configurations.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers