LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1720 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 5, 2026

WowOptin WordPress Plugin - Broken Access Control

Published: March 5, 2026Updated: March 5, 2026Remote Exploitable

Overview

WowOptin WordPress plugin <= 1.4.24 contains an unauthorized arbitrary plugin installation vulnerability caused by missing capability check in 'install_and_active_plugin' function, letting authenticated attackers with Subscriber-level access install and activate plugins.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 3.7%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers with Subscriber-level access can install and activate arbitrary plugins, potentially compromising the entire WordPress site.

Mitigation

Update to the latest version beyond 1.4.24.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 5, 2026

🟠 CVE-2026-1720 - High (8.8) The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' func... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-1720/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1720
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
unconfirmed
EPSS
3.7%
Social Posts
1

CWE

  • CWE-862

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

3.7%Probability of exploitation in the next 30 days