PT-2026-33415 · Flightbycanto · Canto

Abhirup Konwar

·

Published

2026-04-17

·

Updated

2026-04-17

·

CVE-2026-6441

CVSS v3.1

4.3

Medium

AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
The Canto plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 3.1.1. This is due to the absence of any capability check or nonce verification in the updateOptions() function, which is exposed via two AJAX hooks: wp ajax updateOptions (class-canto.php line 231) and wp ajax fbc updateOptions (class-canto-settings.php line 76). Both hooks are registered exclusively under the wp ajax prefix (requiring only a logged-in user), with no call to current user can() or check ajax referer(). This makes it possible for authenticated attackers with subscriber-level access and above to arbitrarily modify or delete plugin options controlling cron scheduling behavior (fbc duplicates, fbc cron, fbc schedule, fbc cron time day, fbc cron time hour, fbc cron start) and to manipulate or clear the plugin's scheduled WordPress cron event (fbc scheduled update).

Fix

Missing Authorization

Weakness Enumeration

Related Identifiers

CVE-2026-6441

Affected Products

Canto