CVE-2026-4021 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 24, 2026
Contest Gallery WordPress Plugin - Authentication Bypass
Overview
Contest Gallery WordPress plugin <= 28.1.5 contains an authentication bypass caused by improper use of email in SQL query and unauthenticated key-based login, letting unauthenticated attackers take over admin accounts, exploit requires RegMailOptional=1 enabled.
Severity & Score
Impact
Unauthenticated attackers can take over any admin account, gaining full site control.
Mitigation
Update to a version later than 28.1.5 or apply vendor patches.
References
- https://plugins.trac.wordpress.org/changeset?old_path=/contest-gallery/tags/28.1.5&new_path=/contest-gallery/tags/28.1.6
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f1b9725b-dee5-44ca-bb33-c6812fb76adc?source=cve
- https://plugins.trac.wordpress.org/browser/contest-gallery/tags/28.1.4/ajax/ajax-functions-frontend.php#L204
- https://plugins.trac.wordpress.org/browser/contest-gallery/tags/28.1.4/v10/v10-admin/users/frontend/registry/users-registry-check-after-email-or-pin-confirmation.php#L153
- https://plugins.trac.wordpress.org/browser/contest-gallery/trunk/ajax/ajax-functions-frontend.php#L204
- https://plugins.trac.wordpress.org/browser/contest-gallery/trunk/v10/v10-admin/users/frontend/registry/users-registry-check-after-email-or-pin-confirmation.php#L153
Social Media Activity(2 posts)
š CVE-2026-4021 - High (8.1) The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-o... š https://www.thehackerwire.com/vulnerability/CVE-2026-4021/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-4021 - High (8.1) The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-o... š https://www.thehackerwire.com/vulnerability/CVE-2026-4021/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4021
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_authentication
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-287
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H