CVE-2026-3546

Published: Mar 21, 2026 Last Modified: Mar 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none

Description

AI Translation Available

The e-shot form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.2. The eshot_form_builder_get_account_data() function is registered as a wp_ajax_ AJAX handler accessible to all authenticated users. The function lacks any capability check (e.g., current_user_can('manage_options')) and does not verify a nonce. It directly queries the database for the e-shot API token stored in the eshotformbuilder_control table and returns it along with all subaccount data as a JSON response. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the e-shot API token and subaccount information, which could then be used to access the victim's e-shot platform account.

202

Exposure of Sensitive Information Through Data Queries

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Files Or Directories Read Application Data
Applicable Platforms
All platforms may be affected
View CWE Details
https://plugins.trac.wordpress.org/browser/e-shot-form-builder/tags/1.0.2/admin…
https://plugins.trac.wordpress.org/browser/e-shot-form-builder/tags/1.0.2/inclu…
https://plugins.trac.wordpress.org/browser/e-shot-form-builder/trunk/admin/clas…
https://plugins.trac.wordpress.org/browser/e-shot-form-builder/trunk/includes/c…
https://www.wordfence.com/threat-intel/vulnerabilities/id/965bb642-4472-491f-83…