TopVuln

High-risk vulnerability digests

CVE-2026-1830

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-04-09 05:16:03
EPSS
0.3% probability · 48.9th percentile — 2026-05-12
Affected versions
Quick Playground plugin for WordPress <= 1.3.1
Summary
This critical vulnerability allows unauthenticated attackers to achieve remote code execution on affected WordPress sites. Insufficient authorization checks on REST API endpoints expose a sync code and permit arbitrary file uploads via path traversal. No prior authenticated access to the target site is required to exploit this flaw.
Remediation
Update the Quick Playground plugin to a patched version immediately if one is released. If no patch is available, remove the plugin entirely from your WordPress installation. Implement web application firewall rules to block access to the plugin's REST API endpoints.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.