CVE-2026-1720
Published: 05 March 2026
Summary
CVE-2026-1720 is a high-severity Missing Authorization (CWE-862) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations to block unauthorized access to the install_and_active_plugin function lacking capability checks.
Applies least privilege to restrict subscriber-level users from performing high-privilege actions like arbitrary plugin installation.
Establishes and enforces policies to control and monitor user-installed software, preventing unauthorized plugin activations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization on plugin install function in public-facing WordPress plugin directly enables remote exploitation (T1190) and arbitrary backdoor/web shell installation (T1505.003).
NVD Description
The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' function in all versions up to, and…
more
including, 1.4.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins.
Deeper analysisAI
CVE-2026-1720 affects the WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress, specifically due to a missing capability check on the 'install_and_active_plugin' function in all versions up to and including 1.4.24. This vulnerability, published on 2026-03-05, enables unauthorized arbitrary plugin installation and has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-862 (Missing Authorization).
Authenticated attackers with Subscriber-level access or higher can exploit this remotely over the network with low complexity and no user interaction required. Successful exploitation allows them to install and activate arbitrary plugins, potentially granting full site compromise through backdoor installation, privilege escalation, or further malicious actions, with high impacts on confidentiality, integrity, and availability.
Wordfence advisories and WordPress plugin trac references detail mitigation, including a patch in changeset 3456826 addressing the issue in includes/utils/class-notice.php at line 848; security practitioners should update to a version beyond 1.4.24 and review access controls for low-privilege users.
Details
- CWE(s)