CVE-2026-39700
Missing Authorization in WPXPO WowOptin Allows Unauthorized Access
Publication date: 2026-04-08
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpxpo | wowoptin | to 1.4.32 (inc) |
| wpxpo | wowoptin | From 1.0.0 (inc) to 1.4.32 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of the CVE-2026-39700 vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
CVE-2026-39700 is a Broken Access Control vulnerability in the WordPress WowOptin Plugin (versions up to and including 1.4.32) caused by missing authorization checks. Detection involves identifying if the vulnerable plugin version is installed and if unauthorized access to privileged plugin functions is possible.
Since the vulnerability allows unauthenticated users to perform privileged actions, detection can include checking for unusual or unauthorized HTTP requests targeting WowOptin plugin endpoints.
Suggested commands to detect the presence of the vulnerable plugin version on your system or network include:
- Using WP-CLI to check the installed plugin version: `wp plugin list --format=json | jq '.[] | select(.name=="wowoptin")'`
- Searching for the plugin directory and version file on the server: `grep -r "Version: 1.4.32" /path/to/wordpress/wp-content/plugins/wowoptin/`
- Monitoring web server logs for suspicious unauthenticated requests to WowOptin plugin endpoints, e.g., using grep: `grep -i wowoptin /var/log/apache2/access.log` or `grep -i wowoptin /var/log/nginx/access.log`
Note that no official patch is currently available, so detection and mitigation rely on identifying the vulnerable plugin version and monitoring for exploitation attempts.
Can you explain this vulnerability to me?
CVE-2026-39700 is a Broken Access Control vulnerability in the WordPress WowOptin Plugin versions up to and including 1.4.32.
The vulnerability arises from missing authorization, authentication, or nonce token checks in certain plugin functions, which allows unauthenticated users to perform actions that normally require higher privileges.
This means that attackers can exploit incorrectly configured access control security levels to bypass restrictions.
How can this vulnerability impact me? :
The vulnerability allows unauthenticated users to perform privileged actions, potentially compromising the security of websites using the affected WowOptin plugin.
Although the CVSS severity score is 5.3, indicating low severity and low priority, it can still be exploited in mass-exploit campaigns affecting many websites regardless of their traffic or popularity.
This could lead to unauthorized changes or access within the affected WordPress sites.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the affected WowOptin plugin to a fixed version or seeking assistance from hosting providers or web developers.
Since no official patch is currently available, contacting your hosting provider or a web developer for help is recommended.