CVE-2026-2001
WowRevenue · WowRevenue Plugin for WordPress
The WowRevenue plugin for WordPress contains a missing capability check in its installation function, allowing unauthorized users to install and activate arbitrary plugins.
Executive summary
The WowRevenue WordPress plugin is vulnerable to a critical flaw that allows unauthorized attackers to install malicious plugins and potentially take full control of the website.
Vulnerability
The vulnerability stems from a missing capability check in the Notice::install_activate_plugin function. This allows an attacker (potentially unauthenticated or low-privileged) to trigger the installation and activation of any plugin from the WordPress repository, which can be leveraged for site takeover.
Business impact
This vulnerability is high-risk (CVSS 8.8) because it provides a direct path to remote code execution and site compromise. An attacker could install a "file manager" or "web shell" plugin to gain full access to the server, leading to data theft, site defacement, or malware distribution.
Remediation
Immediate Action: Update the WowRevenue plugin to the latest version immediately or deactivate the plugin if a patch is not yet available.
Proactive Monitoring: Review the site's plugin list for any unfamiliar or unauthorized plugins and check the wp-content/plugins directory for suspicious files.
Compensating Controls: Use a security plugin to monitor for unauthorized plugin activations and restrict access to the WordPress administrative AJAX and dashboard functions.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The 8.8 CVSS score indicates an urgent need for remediation. Administrators should not only update the plugin but also perform a thorough security audit of their WordPress installation to ensure no unauthorized changes have been made.