DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2026-3596

Critical
Low Medium High Critical
9.8
CVSS Score
Published: Apr 16, 2026
Last Modified: Apr 22, 2026

Vulnerability Description

The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add_option() function. This function reads 'option' and 'opt_value' from $_POST, then calls delete_option() followed by add_option() using these attacker-controlled values without any nonce verification, capability checks, or option name allowlist. This makes it possible for unauthenticated attackers to update arbitrary WordPress options, which can be leveraged for privilege escalation by enabling user registration and setting the default user role to administrator.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Severity Details

9.8
out of 10.0
Critical

Weakness Type (CWE)

CWE-862 Top 25 #8

Missing Authorization

Description
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Exploit Likelihood
High
Typical Severity
High
OWASP Top 10
A01:2021-Broken Access Control
Abstraction Level
Class

Key Information

Published Date
April 16, 2026