CVE-2026-4314 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 23, 2026
The Ultimate WordPress Toolkit – WP Extended - Privilege Escalation
Overview
The Ultimate WordPress Toolkit – WP Extended <= 3.2.4 contains a privilege escalation caused by insecure strpos() check in isDashboardOrProfileRequest() method, letting authenticated attackers with Subscriber access gain admin capabilities by crafted query parameters.
Severity & Score
Impact
Authenticated attackers can escalate privileges to administrator, allowing full control over WordPress options and user accounts.
Mitigation
Update to the latest version beyond 3.2.4.
References
- https://plugins.trac.wordpress.org/browser/wpextended/tags/3.2.4/modules/menu-editor/Bootstrap.php#L135
- https://plugins.trac.wordpress.org/browser/wpextended/tags/3.2.4/modules/menu-editor/Bootstrap.php#L207
- https://plugins.trac.wordpress.org/changeset?old=3475963&old_path=wpextended%2Ftrunk%2Fmodules%2Fmenu-editor%2FBootstrap.php&new=&new_path=wpextended%2Ftrunk%2Fmodules%2Fmenu-editor%2FBootstrap.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/38ea001c-6edb-4f36-a7ec-19be1d857b9e?source=cve
Social Media Activity(1 post)
🟠 CVE-2026-4314 - High (8.8) The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using ... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4314/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4314
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 4.0%
- Social Posts
- 1
CWE
- CWE-269
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H