The Subscribe To Comments Reloaded plugin for WordPress is vulnerable to unauthorized modification of data due to a leaked secret key and usage of a weak hash generation algorithm in all versions up to, and including, 240119. This makes it possible for unauthenticated attackers to extract the global key from any public post page, forge authorization keys and manage comment subscription preferences for arbitrary users
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 05 May 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpkube Wpkube subscribe To Comments Reloaded |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpkube Wpkube subscribe To Comments Reloaded |
Tue, 05 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Subscribe To Comments Reloaded plugin for WordPress is vulnerable to unauthorized modification of data due to a leaked secret key and usage of a weak hash generation algorithm in all versions up to, and including, 240119. This makes it possible for unauthenticated attackers to extract the global key from any public post page, forge authorization keys and manage comment subscription preferences for arbitrary users | |
| Title | Subscribe To Comments Reloaded <= 240119 - Improper Authorization to Unauthenticated Arbitrary Subscription Management | |
| Weaknesses | CWE-200 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-05T02:26:55.996Z
Reserved: 2026-03-18T23:02:48.429Z
Link: CVE-2026-4409
No data.
Status : Received
Published: 2026-05-05T03:15:59.420
Modified: 2026-05-05T03:15:59.420
Link: CVE-2026-4409
No data.
OpenCVE Enrichment
Updated: 2026-05-05T03:30:14Z
Weaknesses