CVE-2026-1830 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: April 9, 2026
Quick Playground WordPress plugin - Remote Code Execution
Published: April 9, 2026Updated: April 9, 2026Remote Exploitable
Overview
Quick Playground WordPress plugin <= 1.3.1 contains a remote code execution caused by insufficient authorization checks on REST API endpoints allowing arbitrary file uploads with path traversal, letting unauthenticated attackers execute code remotely.
Severity & Score
Severity: Critical
CVSS Score: 9.8
Impact
Unauthenticated attackers can execute arbitrary code on the server, potentially leading to full system compromise.
Mitigation
Update to the latest version beyond 1.3.1.
References
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L39
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/expro-api.php#L419
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3500839%40quick-playground&new=3500839%40quick-playground&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/308cd28a-a477-4bc6-a392-ad5a9eca1cb5?source=cve
Related Resources
Details
- CVE ID
- CVE-2026-1830
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- unrestricted_file_upload
- Status
- new
CWE
- CWE-862
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H