LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4314 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 23, 2026

The Ultimate WordPress Toolkit – WP Extended - Privilege Escalation

Published: March 22, 2026Updated: March 23, 2026Remote Exploitable

Overview

The Ultimate WordPress Toolkit – WP Extended <= 3.2.4 contains a privilege escalation caused by insecure strpos() check in isDashboardOrProfileRequest() method, letting authenticated attackers with Subscriber access gain admin capabilities by crafted query parameters.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 4.0%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers can escalate privileges to administrator, allowing full control over WordPress options and user accounts.

Mitigation

Update to the latest version beyond 3.2.4.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 22, 2026

🟠 CVE-2026-4314 - High (8.8) The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using ... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4314/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-4314
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
unconfirmed
EPSS
4.0%
Social Posts
1

CWE

  • CWE-269

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

4.0%Probability of exploitation in the next 30 days