CVE-2026-3480
Missing Authorization in WP Blockade Plugin Allows Arbitrary Shortcode Execution
Publication date: 2026-04-08
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | wp_blockade | to 0.9.14 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The WP Blockade plugin for WordPress has a vulnerability called Missing Authorization in all versions up to and including 0.9.14. This vulnerability exists because the plugin's function render_shortcode_preview(), which is triggered by the admin_post action hook 'wp-blockade-shortcode-render', does not perform any capability checks or nonce verification.
As a result, any authenticated user, even those with Subscriber-level access, can supply a 'shortcode' parameter that the function executes directly. This allows these users to run arbitrary WordPress shortcodes, potentially leading to unauthorized actions.
How can this vulnerability impact me? :
This vulnerability can allow authenticated attackers with low-level access to execute arbitrary shortcodes on the WordPress site. Depending on the shortcodes registered on the site, this could lead to several impacts:
- Information disclosure by exposing sensitive data through certain shortcodes.
- Privilege escalation if shortcodes perform actions that increase user privileges.
- Other impacts such as executing actions or including files that could compromise the site.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated users with Subscriber-level access and above to execute arbitrary WordPress shortcodes without proper authorization checks. This can lead to information disclosure or privilege escalation depending on the shortcodes executed.
Such unauthorized access and potential information disclosure could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls on access to sensitive data and protection against unauthorized disclosure.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying if the WP Blockade plugin is installed and running a vulnerable version (up to and including 0.9.14). Since the vulnerability is triggered via the admin_post action hook 'wp-blockade-shortcode-render' which accepts a 'shortcode' parameter via a GET request, monitoring for unusual or unauthorized requests to this endpoint can help detect exploitation attempts.
You can check the plugin version on your WordPress installation by navigating to the Plugins page or by running the following WP-CLI command:
- wp plugin list | grep wp-blockade
To detect attempts to exploit the vulnerability, you can monitor web server logs for requests to 'admin-post.php' with the action parameter 'wp-blockade-shortcode-render' and a 'shortcode' parameter in the query string. For example, using grep on Apache or Nginx logs:
- grep "admin-post.php?action=wp-blockade-shortcode-render" /var/log/apache2/access.log
- grep "admin-post.php?action=wp-blockade-shortcode-render" /var/log/nginx/access.log
Additionally, you can use network monitoring tools or intrusion detection systems to alert on such requests.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the WP Blockade plugin to a version that fixes this vulnerability if available.
If an update is not yet available, you should restrict access to the vulnerable functionality by limiting access to the 'admin-post.php?action=wp-blockade-shortcode-render' endpoint to trusted users only, or disabling the plugin temporarily.
Additionally, consider implementing web application firewall (WAF) rules to block requests attempting to exploit this vulnerability.
Review user roles and permissions to ensure that only trusted users have authenticated access, as the vulnerability requires at least Subscriber-level access.