VYPR
Medium severity5.9NVD Advisory· Published Mar 11, 2026· Updated Apr 15, 2026

CVE-2026-1867

CVE-2026-1867

Description

The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated attacker can trigger the regeneration of a .json file in the WordPress Guest posting plugin, exposing form data and the admin email address.

The vulnerability resides in the Guest posting / Frontend Posting / Front Editor WordPress plugin (also known as WP Front User Submit) versions before 5.0.6. The plugin initially creates a .json file based on demo data and allows passing a URL parameter to regenerate this file. If an administrator modifies the demo form and enables admin notifications in the plugin's settings, the regenerated .json file includes all form data and settings.

An unauthenticated attacker can exploit this by simply supplying the appropriate URL parameter to trigger the regeneration process. No authentication is required. After the file is regenerated, the attacker can download the .json file, as it is publicly accessible.

The impact is sensitive information disclosure. The exposed .json file contains the administrator's email address and all form configurations. This could enable targeted phishing attacks or further compromise of the WordPress site. The attacker does not gain direct administrative access but obtains valuable intelligence.

The vulnerability has been fixed in version 5.0.6 of the plugin. Users are strongly advised to update immediately. The plugin vendor has confirmed the fix and the issue was publicly disclosed on 2026-02-18 [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.