CVE-2026-3480
Received Received - Intake
Missing Authorization in WP Blockade Plugin Allows Arbitrary Shortcode Execution

Publication date: 2026-04-08

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The WP Blockade plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 0.9.14. The plugin registers an admin_post action hook 'wp-blockade-shortcode-render' that maps to the render_shortcode_preview() function. This function lacks any capability check (current_user_can()) and nonce verification, allowing any authenticated user to execute arbitrary WordPress shortcodes. The function takes a user-supplied 'shortcode' parameter from $_GET, passes it through stripslashes(), and directly executes it via do_shortcode(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes, which could lead to information disclosure, privilege escalation, or other impacts depending on what shortcodes are registered on the site (e.g., shortcodes from other plugins that display sensitive data, perform actions, or include files).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-08
Generated
2026-05-06
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordfence wp_blockade to 0.9.14 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The WP Blockade plugin for WordPress has a vulnerability called Missing Authorization in all versions up to and including 0.9.14. This vulnerability exists because the plugin's function render_shortcode_preview(), which is triggered by the admin_post action hook 'wp-blockade-shortcode-render', does not perform any capability checks or nonce verification.

As a result, any authenticated user, even those with Subscriber-level access, can supply a 'shortcode' parameter that the function executes directly. This allows these users to run arbitrary WordPress shortcodes, potentially leading to unauthorized actions.


How can this vulnerability impact me? :

This vulnerability can allow authenticated attackers with low-level access to execute arbitrary shortcodes on the WordPress site. Depending on the shortcodes registered on the site, this could lead to several impacts:

  • Information disclosure by exposing sensitive data through certain shortcodes.
  • Privilege escalation if shortcodes perform actions that increase user privileges.
  • Other impacts such as executing actions or including files that could compromise the site.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated users with Subscriber-level access and above to execute arbitrary WordPress shortcodes without proper authorization checks. This can lead to information disclosure or privilege escalation depending on the shortcodes executed.

Such unauthorized access and potential information disclosure could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls on access to sensitive data and protection against unauthorized disclosure.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying if the WP Blockade plugin is installed and running a vulnerable version (up to and including 0.9.14). Since the vulnerability is triggered via the admin_post action hook 'wp-blockade-shortcode-render' which accepts a 'shortcode' parameter via a GET request, monitoring for unusual or unauthorized requests to this endpoint can help detect exploitation attempts.

You can check the plugin version on your WordPress installation by navigating to the Plugins page or by running the following WP-CLI command:

  • wp plugin list | grep wp-blockade

To detect attempts to exploit the vulnerability, you can monitor web server logs for requests to 'admin-post.php' with the action parameter 'wp-blockade-shortcode-render' and a 'shortcode' parameter in the query string. For example, using grep on Apache or Nginx logs:

  • grep "admin-post.php?action=wp-blockade-shortcode-render" /var/log/apache2/access.log
  • grep "admin-post.php?action=wp-blockade-shortcode-render" /var/log/nginx/access.log

Additionally, you can use network monitoring tools or intrusion detection systems to alert on such requests.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the WP Blockade plugin to a version that fixes this vulnerability if available.

If an update is not yet available, you should restrict access to the vulnerable functionality by limiting access to the 'admin-post.php?action=wp-blockade-shortcode-render' endpoint to trusted users only, or disabling the plugin temporarily.

Additionally, consider implementing web application firewall (WAF) rules to block requests attempting to exploit this vulnerability.

Review user roles and permissions to ensure that only trusted users have authenticated access, as the vulnerability requires at least Subscriber-level access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart