CVE-2026-1942
Received Received - Intake
Unauthorized Post Modification in Blog2Social Plugin via Missing Capability Check

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the b2s_curation_draft AJAX action in all versions up to, and including, 8.7.4. The curationDraft() function only verifies current_user_can('read') without checking whether the user has edit_post permission for the target post. Combined with the plugin granting UI access and nonce exposure to all roles, this makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the title and content of arbitrary posts and pages by supplying a target post ID via the 'b2s-draft-id' parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
blog2social blog2social to 8.7.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress has a vulnerability due to a missing capability check on the b2s_curation_draft AJAX action in all versions up to and including 8.7.4.

Specifically, the curationDraft() function only verifies if the user has the 'read' capability but does not check whether the user has permission to edit the target post.

Because the plugin grants UI access and nonce exposure to all user roles, authenticated attackers with Subscriber-level access or higher can exploit this flaw.

They can overwrite the title and content of arbitrary posts and pages by supplying a target post ID via the 'b2s-draft-id' parameter.


How can this vulnerability impact me? :

This vulnerability allows authenticated users with low-level access (Subscriber and above) to modify the content of any post or page on the affected WordPress site.

An attacker could overwrite post titles and content arbitrarily, potentially defacing the website, injecting misleading or malicious content, or disrupting the site's normal operation.

Since the integrity of posts can be compromised without proper authorization, this can lead to loss of trust, damage to reputation, and possible further exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves unauthorized modification of WordPress posts via the Blog2Social plugin's AJAX action 'b2s_curation_draft'. Detection involves monitoring for suspicious AJAX requests targeting this action, especially those that include the 'b2s-draft-id' parameter to overwrite post content."}, {'type': 'paragraph', 'content': "You can detect exploitation attempts by inspecting web server logs for POST requests to admin-ajax.php with the action parameter set to 'b2s_curation_draft'. Look for requests from authenticated users with Subscriber-level access or higher."}, {'type': 'paragraph', 'content': 'Suggested commands to detect such activity include:'}, {'type': 'list_item', 'content': 'Using grep to find suspicious AJAX calls in web server logs: grep "action=b2s_curation_draft" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': 'Filtering for POST requests with \'b2s-draft-id\' parameter: grep "b2s-draft-id" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': 'Using WordPress CLI to check recent post modifications that might be unauthorized: wp post list --post_type=post --orderby=modified --order=desc --fields=ID,post_title,post_modified'}, {'type': 'paragraph', 'content': 'Additionally, monitoring for unexpected changes in post titles and content, especially from users with low privileges, can help detect exploitation.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Update the Blog2Social plugin to a version later than 8.7.4 where the missing capability check on the 'b2s_curation_draft' AJAX action is fixed.
  • Restrict access to the plugin's AJAX actions by ensuring proper capability checks are enforced, especially verifying 'edit_post' permissions before allowing post modifications.
  • Temporarily disable or restrict the plugin's AJAX endpoints if an immediate update is not possible.
  • Review user roles and permissions to limit Subscriber-level users from having unnecessary access to plugin features.
  • Monitor logs for suspicious activity related to the 'b2s_curation_draft' action and respond to any detected exploitation attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart