PT-2026-33399 · Tomdever · Wpforo Forum
Jared Reyes
·
Published
2026-04-17
·
Updated
2026-04-17
·
CVE-2026-4666
CVSS v3.1
6.5
Medium
| AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
The wpForo Forum plugin for WordPress is vulnerable to unauthorized modification of data due to the use of
extract($args, EXTR OVERWRITE) on user-controlled input in the edit() method of classes/Posts.php in all versions up to, and including, 2.4.16. The post edit action handler in Actions.php passes $ REQUEST['post'] directly to Posts::edit(), which calls extract($args, EXTR OVERWRITE). An attacker can inject post[guestposting]=1 to overwrite the local $guestposting variable, causing the entire permission check block to be skipped. The nonce check uses a hardcoded wpforo verify form action shared across all 8 forum templates, so any user who can view any forum page obtains a valid nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit the title, body, name, and email fields of any forum post, including posts in private forums, admin posts, and moderator posts. Content passes through wpforo kses() which strips JavaScript but allows rich HTML.Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wpforo Forum