CVE-2026-4409
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none
Description
AI Translation Available
The Subscribe To Comments Reloaded plugin for WordPress is vulnerable to unauthorized modification of data due to a leaked secret key and usage of a weak hash generation algorithm in all versions up to, and including, 240119. This makes it possible for unauthenticated attackers to extract the global key from any public post page, forge authorization keys and manage comment subscription preferences for arbitrary users
200
Exposure of Sensitive Information to an Unauthorized Actor
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies:
Mobile, Not Technology-Specific, Web Based
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://www.wordfence.com/threat-intel/vulnerabilities/id/91f9235e-f578-475f-92…