PT-2026-26965 · Wpextended · The Ultimate Wordpress Toolkit – Wp Extended

Hung Nguyen

·

Published

2026-03-22

·

Updated

2026-03-22

·

CVE-2026-4314

CVSS v3.1

8.8

High

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the isDashboardOrProfileRequest() method in the Menu Editor module using an insecure strpos() check against $ SERVER['REQUEST URI'] to determine if a request targets the dashboard or profile page. The grantVirtualCaps() method, which is hooked into the user has cap filter, grants elevated capabilities including manage options when this check returns true. This makes it possible for authenticated attackers, with Subscriber-level access and above, to gain administrative capabilities by appending a crafted query parameter to any admin URL, allowing them to update arbitrary WordPress options and ultimately create new Administrator accounts.

Fix

Improper Privilege Management

Weakness Enumeration

Related Identifiers

CVE-2026-4314

Affected Products

The Ultimate Wordpress Toolkit – Wp Extended