CVE-2026-2269
Published: 03 March 2026
Summary
CVE-2026-2269 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing WordPress plugin directly enables T1190 exploitation; arbitrary remote file storage/upload enables T1105 for RCE.
NVD Description
The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.0.0.3 via the download_url() function. This makes it possible for authenticated attackers,…
more
with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Additionally, the plugin stores the contents of the remote files on the server, which can be leveraged to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2026-2269 is a Server-Side Request Forgery (SSRF) vulnerability in the Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress, affecting all versions up to and including 7.0.0.3. The flaw exists in the download_url() function, which allows the server to make unauthorized web requests to arbitrary locations. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type).
Authenticated attackers with Administrator-level access or higher can exploit this vulnerability to initiate web requests from the affected WordPress site to arbitrary internal or external locations, enabling them to query or modify sensitive information on internal services. Additionally, the plugin stores the contents of these remote files directly on the server, which attackers can leverage to upload arbitrary files, potentially resulting in remote code execution on the compromised site.
Mitigation is addressed in a patch via WordPress plugin trac changeset 3471238. Further details on the vulnerability and remediation are available in Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/80848de3-a772-4078-aa04-29e1d6e3ff73?source=cve.
Details
- CWE(s)