TopVuln

High-risk vulnerability digests

CVE-2026-3461

  • CRITICAL

Details

CVSS v3
9.8
EPSS
0.3% probability · 50.0th percentile — 2026-05-12
Affected versions
Visa Acceptance Solutions plugin for WordPress all versions <= 2.1.0
Summary
This vulnerability allows unauthenticated attackers to bypass authentication in the vulnerable plugin. Attackers can log in as any existing user, including administrators, by simply providing the target user's billing email without any ownership verification. This leads to full account takeover and complete compromise of the WordPress site.
Remediation
Update the Visa Acceptance Solutions plugin to a fixed version if a patch is available. If no patch is released, deactivate and remove the plugin from your WordPress installation immediately. Monitor for unauthorized accounts and suspicious admin activity on affected sites.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.