MEDIUM (6.3)
    Plugin

    Unauthorized Data Overwriting via REST Route in LeadConnector Plugin

    Published Date: 3/26/2026
    CVE ID: CVE-2026-1890

    Summary

    The LeadConnector plugin for WordPress before version 3.0.22 lacks proper authorization on a REST API route. This allows unauthenticated users to manipulate and potentially overwrite existing data through unauthorized API calls.

    Vulnerability Details

    In the LeadConnector WordPress plugin, a vulnerability exists in versions prior to 3.0.22 due to improper access control in a REST API route. Typically, API routes should enforce strong authentication measures to ensure that only authorized users can interact with them. However, this particular route lacks such authorization checks, allowing anyone accessing the endpoint to modify the data. The absence of authorization controls presents a significant risk, as attackers could potentially alter sensitive information or disrupt the functionality of the website relying on these data records. Exploiting this flaw does not require any prior authentication, making it trivially accessible to malicious actors. Ensuring adequate access control mechanisms are in place is crucial to prevent unauthorized data manipulation.

    Recommendations

    Site administrators should immediately review and enforce access control configurations on all REST API routes. Employing WordPress security plugins that offer enhanced monitoring and firewall capabilities can help mitigate such vulnerabilities. Furthermore, regularly updating plugins and consulting with plugin developers for security advisories is recommended.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More