CVE-2026-4409

Published: Mag 05, 2026 Last Modified: Mag 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none

Description

AI Translation Available

The Subscribe To Comments Reloaded plugin for WordPress is vulnerable to unauthorized modification of data due to a leaked secret key and usage of a weak hash generation algorithm in all versions up to, and including, 240119. This makes it possible for unauthenticated attackers to extract the global key from any public post page, forge authorization keys and manage comment subscription preferences for arbitrary users

200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://plugins.trac.wordpress.org/browser/subscribe-to-comments-reloaded/tags/…
https://www.wordfence.com/threat-intel/vulnerabilities/id/91f9235e-f578-475f-92…