MEDIUM (6.0)
    Plugin

    Hardcoded MySQL Credentials Exposure in Text to Speech for WP Plugin

    Published Date: 4/4/2026
    CVE ID: CVE-2026-1233

    Summary

    The Text to Speech for WP (AI Voices by Mementor) plugin up to version 1.9.8 contains hardcoded MySQL credentials that expose sensitive information. This vulnerability can be exploited by unauthenticated attackers to gain unauthorized write access to the vendor's telemetry database.

    Vulnerability Details

    The vulnerability resides in the `Mementor_TTS_Remote_Telemetry` class of the Text to Speech for WP plugin, where hardcoded MySQL database credentials are used. These credentials connect to the vendor's external telemetry server, representing a significant security flaw. If attackers can extract these credentials, they could potentially gain unauthorized write access to the vendor's telemetry database, posing risks of data manipulation or data corruption. This issue arises because the sensitive credentials are not encrypted or protected, allowing attackers to potentially decode them using reverse engineering or simple inspection techniques. This flaw highlights a significant lapse in secure coding practices, especially concerning sensitive data handling within WordPress plugins.

    Recommendations

    Site administrators should immediately restrict access to endpoints related to the plugin's telemetry functionality using firewall rules. Additionally, monitor for any unusual database activity until a fix is applied. Developers should ensure no hardcoded credentials are present in future releases and apply proper security measures such as encryption and secure credential storage best practices.

    Available Fixes

    Last Updated: 4/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More