Unauthorized Data Modification in Hostinger Reach Plugin for WordPress
CVE-2026-2515

5.3MEDIUM

What is CVE-2026-2515?

The Hostinger Reach plugin for WordPress has a vulnerability that allows authenticated attackers with Subscriber-level access or higher to alter data within the plugin. This occurs due to a missing capability check in the 'handle_ajax_action' function, specifically when utilizing the 'hostinger_reach_connection_notice_action' action. The exploit is possible only when the plugin is not connected to a site, meaning no API key value exists in the database. Attackers can leverage this vulnerability to update critical settings, including the API key, thereby posing a significant risk to plugin integrity.

Affected Version(s)

Hostinger Reach – AI-Powered Email Marketing for WordPress 0 <= 1.3.8

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
.