CVE-2026-3546

The e-shot form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.2. The eshot_form_builder_get_account_data() function is registered as a wp_ajax_ AJAX handler accessible to all authenticated users. The function lacks any capability check (e.g., current_user_can('manage_options')) and does not verify a nonce. It directly queries the database for the e-shot API token stored in the eshotformbuilder_control table and returns it along with all subaccount data as a JSON response. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the e-shot API token and subaccount information, which could then be used to access the victim's e-shot platform account.
Configurations

No configuration.

History

No history.

Information

Published : 2026-03-21 04:17

Updated : 2026-03-23 14:32


NVD link : CVE-2026-3546

Mitre link : CVE-2026-3546

CVE.ORG link : CVE-2026-3546


JSON object : View

Products Affected

No product.

CWE
CWE-202

Exposure of Sensitive Information Through Data Queries