EUVD-2026-13522

| CVE-2026-4038 CRITICAL
2026-03-20 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 20, 2026 - 08:37 vuln.today
EUVD ID Assigned
Mar 20, 2026 - 08:37 euvd
EUVD-2026-13522
CVE Published
Mar 20, 2026 - 04:16 nvd
CRITICAL 9.8

Description

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

Analysis

The Aimogen Pro plugin for WordPress contains an arbitrary function call vulnerability allowing unauthenticated attackers to execute privileged WordPress functions without authorization. All versions up to and including 2.7.5 are affected, enabling attackers to modify critical site settings such as changing the default user registration role to administrator, then registering as an admin to gain full site control. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all installations of Aimogen Pro plugin version 2.7.5 and below across your WordPress infrastructure; disable or deactivate the plugin immediately if no business-critical dependency exists. Within 7 days: Contact Aimogen Pro vendor for patch timeline and ETA; implement temporary network or WAF controls to restrict plugin access if disablement is not feasible; review admin user accounts for unauthorized creation. …

Sign in for detailed remediation steps.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Share

EUVD-2026-13522 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy