CVE-2026-1867
Description
The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated attacker can trigger the regeneration of a .json file in the WordPress Guest posting plugin, exposing form data and the admin email address.
The vulnerability resides in the Guest posting / Frontend Posting / Front Editor WordPress plugin (also known as WP Front User Submit) versions before 5.0.6. The plugin initially creates a .json file based on demo data and allows passing a URL parameter to regenerate this file. If an administrator modifies the demo form and enables admin notifications in the plugin's settings, the regenerated .json file includes all form data and settings.
An unauthenticated attacker can exploit this by simply supplying the appropriate URL parameter to trigger the regeneration process. No authentication is required. After the file is regenerated, the attacker can download the .json file, as it is publicly accessible.
The impact is sensitive information disclosure. The exposed .json file contains the administrator's email address and all form configurations. This could enable targeted phishing attacks or further compromise of the WordPress site. The attacker does not gain direct administrative access but obtains valuable intelligence.
The vulnerability has been fixed in version 5.0.6 of the plugin. Users are strongly advised to update immediately. The plugin vendor has confirmed the fix and the issue was publicly disclosed on 2026-02-18 [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Guest posting / Frontend Posting / Front Editor/Guest posting / Frontend Posting / Front Editorllm-createRange: <5.0.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.