CVE-2026-4330
Received Received - Intake
Authorization Bypass in Blog2Social Plugin Allows Post Manipulation

Publication date: 2026-04-08

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
blog2social blog2social to 8.8.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress has an authorization bypass vulnerability in all versions up to and including 8.8.3. This occurs because the plugin's AJAX handlers do not verify that the user-supplied 'b2s_id' parameter belongs to the current user before performing update and delete operations.

As a result, authenticated users with Subscriber-level access or higher can modify, reschedule, or delete scheduled social media posts that belong to other users.


How can this vulnerability impact me? :

This vulnerability allows attackers with low-level authenticated access to interfere with other users' scheduled social media posts by modifying, rescheduling, or deleting them without proper authorization.

Such unauthorized actions could disrupt social media campaigns, cause loss of important scheduled content, and potentially damage the reputation or operations of the affected organization.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart