CVE-2026-4124

Published: Apr 09, 2026 Last Modified: Apr 13, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,4
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: low

Description

AI Translation Available

The Ziggeo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1. The wp_ajax_ziggeo_ajax handler only verifies a nonce (check_ajax_referer) but performs no capability checks via current_user_can(). Furthermore, the nonce ('ziggeo_ajax_nonce') is exposed to all logged-in users on every page via the wp_head and admin_head hooks . This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke multiple administrative operations including: saving arbitrary translation strings (translations_panel_save_strings via update_option('ziggeo_translations')), creating/updating/deleting event templates (event_editor_save_template/update_template/remove_template via update_option('ziggeo_events')), modifying SDK application settings (sdk_applications operations), and managing notifications (notification_handler via update_option('ziggeo_notifications')).

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0005
Percentile
0,2th
Updated

EPSS Score Trend (Last 8 Days)

862

Missing Authorization

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control Availability
Potential Impacts:
Read Application Data Read Files Or Directories Modify Application Data Modify Files Or Directories Gain Privileges Or Assume Identity Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Resource Consumption (Other)
Applicable Platforms
Technologies: AI/ML, Database Server, Not Technology-Specific, Web Server
View CWE Details
https://plugins.trac.wordpress.org/browser/ziggeo/tags/3.1.1/admin/page_editor_…
https://plugins.trac.wordpress.org/browser/ziggeo/tags/3.1.1/admin/page_sdk_aja…
https://plugins.trac.wordpress.org/browser/ziggeo/tags/3.1.1/admin/page_transla…
https://plugins.trac.wordpress.org/browser/ziggeo/tags/3.1.1/core/ajax.php#L31
https://plugins.trac.wordpress.org/browser/ziggeo/tags/3.1.1/core/header.php#L67
https://plugins.trac.wordpress.org/browser/ziggeo/trunk/admin/page_editor_event…
https://plugins.trac.wordpress.org/browser/ziggeo/trunk/admin/page_sdk_ajax.php…
https://plugins.trac.wordpress.org/browser/ziggeo/trunk/admin/page_translations…
https://plugins.trac.wordpress.org/browser/ziggeo/trunk/core/ajax.php#L31
https://plugins.trac.wordpress.org/browser/ziggeo/trunk/core/header.php#L67
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&ol…
https://www.wordfence.com/threat-intel/vulnerabilities/id/15477c00-0764-4850-8b…