Cyber Posture

CVE-2026-2269

High

Published: 03 March 2026

Published
03 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0032 54.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2269 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-434

Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.

addresses: CWE-434

Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.

addresses: CWE-434

Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.

addresses: CWE-434

Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

SSRF in public-facing WordPress plugin directly enables T1190 exploitation; arbitrary remote file storage/upload enables T1105 for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.0.0.3 via the download_url() function. This makes it possible for authenticated attackers,…

more

with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Additionally, the plugin stores the contents of the remote files on the server, which can be leveraged to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2026-2269 is a Server-Side Request Forgery (SSRF) vulnerability in the Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress, affecting all versions up to and including 7.0.0.3. The flaw exists in the download_url() function, which allows the server to make unauthorized web requests to arbitrary locations. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type).

Authenticated attackers with Administrator-level access or higher can exploit this vulnerability to initiate web requests from the affected WordPress site to arbitrary internal or external locations, enabling them to query or modify sensitive information on internal services. Additionally, the plugin stores the contents of these remote files directly on the server, which attackers can leverage to upload arbitrary files, potentially resulting in remote code execution on the compromised site.

Mitigation is addressed in a patch via WordPress plugin trac changeset 3471238. Further details on the vulnerability and remediation are available in Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/80848de3-a772-4078-aa04-29e1d6e3ff73?source=cve.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-25783Shared CWE-434
CVE-2025-27683Shared CWE-434
CVE-2025-63994Shared CWE-434
CVE-2025-6207Shared CWE-434
CVE-2025-6079Shared CWE-434
CVE-2025-6222Shared CWE-434
CVE-2026-32523Shared CWE-434
CVE-2025-66256Shared CWE-434
CVE-2024-13908Shared CWE-434
CVE-2026-3891Shared CWE-434

References