The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server. | |
| Title | Quick Playground <= 1.3.1 - Missing Authorization to Unauthenticated Arbitrary File Upload | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-09T03:25:57.200Z
Reserved: 2026-02-03T14:35:29.820Z
Link: CVE-2026-1830
No data.
Status : Received
Published: 2026-04-09T05:16:03.420
Modified: 2026-04-09T05:16:03.420
Link: CVE-2026-1830
No data.
OpenCVE Enrichment
No data.
Weaknesses