Critical WordPress Plugin Flaw Grants Admin Privileges

Critical WordPress Plugin Flaw Grants Admin Privileges

The National Vulnerability Database (NVD) has issued a critical advisory for CVE-2026-4880, impacting the Barcode Scanner (+Mobile App) plugin for WordPress. This nasty vulnerability, present in all versions up to and including 1.11.0, allows unauthenticated attackers to escalate their privileges to full administrator access. Yeah, you heard that right – full admin.

The root cause lies in insecure token-based authentication. The plugin, designed for inventory management, order fulfillment, and POS systems, apparently trusts a user-supplied Base64-encoded user ID within its ‘token’ parameter. Compounding this, valid authentication tokens are leaked via the ‘barcodeScannerConfigs’ action, and there’s a serious lack of meta-key restrictions on the ‘setUserMeta’ action. This trifecta of poor security hygiene means an attacker can spoof an admin user ID, snag their authentication token, and then use it to update any user’s ‘wp_capabilities’ meta to seize complete control. It’s a textbook privilege escalation scenario, and frankly, it’s a bit of a facepalm moment for a plugin handling critical business functions.

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 6 SIEM formats

7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high T1078.004 Initial Access

Credential Abuse from Breached Vendor — CVE-2026-4880

✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-4880 Privilege Escalation Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress versions <= 1.11.0
CVE-2026-4880 Auth Bypass Insecure token-based authentication via 'token' parameter (Base64-encoded user ID)
CVE-2026-4880 Information Disclosure Leaking valid authentication tokens through the 'barcodeScannerConfigs' action
CVE-2026-4880 Privilege Escalation Lack of meta-key restrictions on the 'setUserMeta' action to update 'wp_capabilities'

Related Posts

CVE-2026-40962 — Out-of-Bounds $1

CVE-2026-40962 — FFmpeg before 8.1 has an integer overflow and resultant out-of-bounds write via CENC (Common Encryption) subsample data to libavformat/mov.c.

vulnerabilityCVEout-of-bounds-1cwe-190
/MEDIUM /⚑ 2 IOCs

Critical Heap Overflow in Creolabs Gravity Exposes Arbitrary Code Execution

CVE-2026-40504 — Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting...

vulnerabilityCVEcriticalhigh-severitycode-executioncwe-122
/CRITICAL /⚑ 3 IOCs

CVE-2026-3299 — Cross-Site Scripting (XSS)

CVE-2026-3299 — The WP YouTube Lyte plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'lyte' shortcode in all versions up to,...

vulnerabilityCVEcross-site-scripting-xss-cwe-79
/MEDIUM /⚑ 2 IOCs