UNKNOWN (0.0)
    Plugin

    Unauthorized Arbitrary Plugin Installation in WowOptin Popup Maker

    Published Date: 3/5/2026
    CVE ID: CVE-2026-1720

    Summary

    The WowOptin: Next-Gen Popup Maker plugin for WordPress contains a vulnerability that allows authenticated users, with Subscriber-level access or higher, to install and activate arbitrary plugins. This issue affects all versions up to and including 1.4.24 due to a missing capability check.

    Vulnerability Details

    This vulnerability arises from inadequate access control within the 'install_and_active_plugin' function of the WowOptin: Next-Gen Popup Maker plugin. All users with access as low as Subscriber-level can exploit this flaw, potentially installing and activating plugins without authorization. Such an action could lead to the introduction of malicious plugins, escalating to further attacks or unauthorized functionality on the site. The root cause of the vulnerability is the absence of proper user role and capability checks in the code handling plugin installations. This could compromise the entire site's security posture if exploited, as arbitrary plugins could execute any code permitted by WordPress architecture.

    Recommendations

    To mitigate this vulnerability, site administrators should restrict user privileges to the minimum necessary. Users without the need for plugin management capabilities should be demoted to roles beneath Subscriber if possible. Regularly audit user roles and permissions, and monitor for unauthorized plugin installations.

    Available Fixes

    Last Updated: 3/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More