๐Ÿ” CVE Alert

CVE-2026-4666

MEDIUM 6.5

wpForo Forum <= 2.4.16 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Forum Post Modification via 'guestposting' Parameter

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The wpForo Forum plugin for WordPress is vulnerable to unauthorized modification of data due to the use of `extract($args, EXTR_OVERWRITE)` on user-controlled input in the `edit()` method of `classes/Posts.php` in all versions up to, and including, 2.4.16. The `post_edit` action handler in `Actions.php` passes `$_REQUEST['post']` directly to `Posts::edit()`, which calls `extract($args, EXTR_OVERWRITE)`. An attacker can inject `post[guestposting]=1` to overwrite the local `$guestposting` variable, causing the entire permission check block to be skipped. The nonce check uses a hardcoded `wpforo_verify_form` action shared across all 8 forum templates, so any user who can view any forum page obtains a valid nonce. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit the title, body, name, and email fields of any forum post, including posts in private forums, admin posts, and moderator posts. Content passes through `wpforo_kses()` which strips JavaScript but allows rich HTML.

CWE CWE-862
Vendor tomdever
Product wpforo forum
Published Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for tomdever wpforo forum

Be the first to know when new medium vulnerabilities affecting tomdever wpforo forum are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

tomdever / wpForo Forum
0 โ‰ค 2.4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/049ffab1-677d-4112-9f1d-092ee01299f1?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.16/classes/Posts.php#L283 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.16/classes/Posts.php#L285 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.16/classes/Actions.php#L773 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.16/includes/functions.php#L532 wordpress.org: https://wordpress.org/plugins/wpforo/ ti.wordfence.io: https://ti.wordfence.io/vendors/patch/1885/download plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?old_path=%2Fwpforo/tags/2.4.16&new_path=%2Fwpforo/tags/2.4.17

Credits

Jared Reyes