CVE-2026-3649
Received Received - Intake
Missing Authorization in Katalogportal PDF Sync Plugin Allows Data Exposure

Publication date: 2026-04-15

Last updated on: 2026-04-15

Assigner: Wordfence

Description
The Katalogportal PDF Sync plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.0.0. The katalogportal_popup_shortcode() function is registered as an AJAX handler via wp_ajax_katalogportal_shortcodePrinter but lacks any capability check (current_user_can()) or nonce verification. This allows any authenticated user, including Subscribers, to call the endpoint and retrieve a list of all synchronized PDF attachments (including those attached to private or draft posts) along with their titles, actual filenames, and the katalogportal_userid configuration value. The WP_Query uses post_status => 'any' which returns attachments regardless of the parent post's visibility status.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
katalogportal pdf_sync to 1.0.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Katalogportal PDF Sync plugin for WordPress has a vulnerability called Missing Authorization in all versions up to 1.0.0. Specifically, the katalogportal_popup_shortcode() function is registered as an AJAX handler but does not perform any capability checks or nonce verification. This means that any authenticated user, even those with minimal permissions like Subscribers, can access this AJAX endpoint.

Through this endpoint, unauthorized users can retrieve a list of all synchronized PDF attachments, including those linked to private or draft posts. The information exposed includes the titles of the PDFs, their actual filenames, and a configuration value called katalogportal_userid.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information. Since any authenticated user can retrieve PDF attachments from private or draft posts, confidential or unpublished documents may be exposed to users who should not have access.

The exposure of actual filenames and configuration values may also aid attackers in further reconnaissance or exploitation efforts. Although the vulnerability does not allow modification or deletion of data, the confidentiality impact is significant.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows any authenticated user, including low-privilege users, to retrieve a list of all synchronized PDF attachments, including those attached to private or draft posts, along with sensitive metadata such as titles, filenames, and configuration values.

Such unauthorized access to potentially sensitive or private documents could lead to violations of data protection regulations like GDPR or HIPAA, which require strict controls over access to personal or protected information.

Therefore, exploitation of this vulnerability may compromise compliance with these standards by exposing confidential or private data without proper authorization.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the katalogportal_popup_shortcode() AJAX handler being accessible without authorization checks, allowing any authenticated user to retrieve sensitive PDF attachment data.

To detect exploitation attempts on your system or network, you can monitor for AJAX requests to the endpoint associated with the action 'katalogportal_shortcodePrinter'.

  • Check your web server logs or WordPress access logs for POST requests containing 'action=katalogportal_shortcodePrinter'.
  • Use command-line tools like grep to search logs, for example: grep 'action=katalogportal_shortcodePrinter' /path/to/access.log
  • Monitor authenticated user activity for unusual or unexpected calls to this AJAX endpoint.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves restricting access to the vulnerable AJAX handler by implementing proper authorization checks.

  • Update the Katalogportal PDF Sync plugin to a version that includes authorization checks if available.
  • If no update is available, apply a temporary patch to the katalogportal_popup_shortcode() function to include capability checks (e.g., current_user_can()) and nonce verification.
  • Limit user roles that can access this AJAX endpoint to trusted roles only.
  • Monitor and audit user activity for suspicious access patterns.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart