PT-2026-42737 · WordPress · Audioigniter
Nudien Udin
·
Published
2026-05-22
·
Updated
2026-05-22
·
CVE-2026-8679
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
AudioIgniter versions prior to 2.0.3
Description
The AudioIgniter plugin for WordPress contains an Insecure Direct Object Reference (IDOR) issue. This occurs because the
handle playlist endpoint() function (hooked to template redirect) accepts a user-controlled playlist ID through the audioigniter playlist id query variable or the '/audioigniter/playlist/{id}/' endpoint and returns track data without verifying authentication, capabilities, or post status, validating only the post type. This allows unauthenticated attackers to access track metadata, including titles, artists, audio URLs, purchase links, download URLs, and cover images, for any playlist, including those marked as draft, private, pending, or trash.Recommendations
Update to a version later than 2.0.2.
Fix
IDOR
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Audioigniter