CVE-2026-3155
OneSignal – Web Push Notifications <= 3.8.0 - Missing Authorization to Authenticated (Subscriber+) Post Meta Deletion via 'post_id'
CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
7th
The OneSignal – Web Push Notifications plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 3.8.0. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete OneSignal metadata for arbitrary posts.
| CWE | CWE-862 |
| Vendor | onesignal |
| Product | onesignal – web push notifications |
| Published | Apr 16, 2026 |
| Last Updated | Apr 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for onesignal onesignal – web push notifications
Be the first to know when new low vulnerabilities affecting onesignal onesignal – web push notifications are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
onesignal / OneSignal – Web Push Notifications
0 ≤ 3.8.0
References
Credits
Muhammad Sharief