Unauthorized Data Access in Greenshift Animation and Page Builder Blocks for WordPress
CVE-2026-1927

5.4MEDIUM

What is CVE-2026-1927?

The Greenshift plugin for WordPress is susceptible to unauthorized data access due to a missing capability check in the greenshift_app_pass_validation() function. This vulnerability affects all versions up to and including 12.5.7, allowing authenticated attackers with Subscriber-level access or higher to retrieve sensitive global plugin settings, including stored AI API keys.

Affected Version(s)

Greenshift – animation and page builder blocks 0 <= 12.6

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ISMAILSHADOW
.