CVE-2026-1306
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.
Analysis
Arbitrary file upload in midi-Synth WordPress plugin via 'export' AJAX action.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Disable or remove the midi-Synth plugin immediately; audit server logs for suspicious file uploads since plugin installation. Within 7 days: Scan the server for backdoors, webshells, and unauthorized files; review file integrity on web root; change all credentials. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today