6.5
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Lifecycle Timeline
4
PoC Detected
Apr 07, 2026 - 17:16 vuln.today
Public exploit code
EUVD ID Assigned
Apr 07, 2026 - 06:45 euvd
EUVD-2026-19576
Analysis Generated
Apr 07, 2026 - 06:45 vuln.today
CVE Published
Apr 07, 2026 - 06:00 nvd
MEDIUM 6.5
Description
The Link Whisper Free WordPress plugin before 0.9.1 has a publicly accessible REST endpoint that allows unauthenticated settings updates.
Analysis
Unauthenticated attackers can modify plugin settings via a publicly accessible REST endpoint in Link Whisper Free WordPress plugin before version 0.9.1, enabling information disclosure and unauthorized configuration changes. The vulnerability has publicly available exploit code and affects all versions prior to 0.9.1. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Priority Score
53
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: +20
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2026-19576
GHSA-9w5f-xhp2-5782