WordPress Plugin Flaw Allows Arbitrary Plugin Installation and RCE

WordPress Plugin Flaw Allows Arbitrary Plugin Installation and RCE

The ExactMetrics – Google Analytics Dashboard for WordPress plugin, specifically versions up to and including 9.1.2, harbors a critical vulnerability. According to the National Vulnerability Database, this flaw allows authenticated attackers with editor-level access and the ‘exactmetrics_view_dashboard’ capability to install and activate arbitrary plugins. The vulnerability stems from the exposure of an ‘onboarding_key’ which bypasses authorization checks for a critical REST endpoint, ultimately leading to Remote Code Execution.

Attackers can leverage this by obtaining a one-time hash token via the ‘/wp-json/exactmetrics/v1/onboarding/connect-url’ endpoint. This token, when passed to the ‘exactmetrics_connect_process’ AJAX endpoint, allows the installation of any plugin from a URL provided in the ‘file’ parameter. Crucially, this endpoint lacks nonce verification and capability checks, making it a direct pathway for attackers to gain control of a WordPress site.

Defenders must prioritize patching this vulnerability. Any WordPress site utilizing the ExactMetrics plugin should be updated to a secure version immediately. Administrators should also review user roles and permissions, particularly ensuring that only trusted individuals possess the ‘exactmetrics_view_dashboard’ capability. This incident underscores the persistent risk of supply chain attacks and privilege escalation vulnerabilities within popular WordPress plugins.

What This Means For You

  • If your organization uses the ExactMetrics – Google Analytics Dashboard for WordPress plugin (versions up to 9.1.2), you must patch immediately to prevent unauthorized plugin installation and potential Remote Code Execution. Audit user roles to ensure the 'exactmetrics_view_dashboard' capability is only assigned to trusted personnel.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-5464 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-5464 - ExactMetrics Plugin Arbitrary Plugin Installation

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-5464 Vulnerability CVE-2026-5464
CVE-2026-5464 Affected Product all
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 23, 2026 at 13:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

Critical Code Injection Flaw in FunnelFormsPro Exposes Remote Execution Risk

CVE-2026-39440 — Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through...

vulnerabilityCVEcriticalhigh-severitycwe-94
/SCW Vulnerability Desk /CRITICAL /9.9 /⚑ 4 IOCs /⚙ 3 Sigma

CVE-2025-66286 — An API design flaw in WebKitGTK and WPE WebKit allows

CVE-2025-66286 — An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests....

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /4.7 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2025-13763 — Information Disclosure

CVE-2025-13763 — Multiple uses of uninitialized variables were found in libopensc that may lead to information disclosure or application crash. An attack requires a crafted...

vulnerabilityCVEmedium-severityinformation-disclosure
/SCW Vulnerability Desk /MEDIUM /5.7 /⚑ 1 IOC /⚙ 3 Sigma