CVE-2026-1830
Quick Playground <= 1.3.1 - Missing Authorization to Unauthenticated Arbitrary File Upload
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.
*Credits:
Athiwat Tiprasaharn, Itthidej Aramsri, Vilaysone CHANTHAVONG, Waris Damkham
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2026-02-03 CVE Reserved
- 2026-04-09 CVE Published
- 2026-04-13 CVE Updated
- 2026-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-862: Missing Authorization
CAPEC
References (4)
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Davidfcarr Search vendor "Davidfcarr" | Quick Playground Search vendor "Davidfcarr" for product "Quick Playground" | <= 1.3.1 Search vendor "Davidfcarr" for product "Quick Playground" and version " <= 1.3.1" | en |
Affected
| ||||||
