wpForo Forum Plugin Hit by Six Critical Vulnerabilities
WordPress plugin wpForo 2.4.14 contains unauthenticated SQL injection, PHP object injection, and multiple authorization bypass flaws. Over 80,000 sites at risk.
Security researchers disclosed a cluster of six vulnerabilities in wpForo Forum, a popular WordPress plugin with over 80,000 active installations. The flaws range from unauthenticated SQL injection to PHP object injection with RCE potential, creating multiple attack paths into WordPress sites running the plugin.
The most severe issues—CVE-2026-28562 and CVE-2026-1581—allow unauthenticated attackers to extract credentials and sensitive data directly from the WordPress database. No login required. Both flaws exist in wpForo version 2.4.14, the current release as of this disclosure.
Unauthenticated SQL Injection (CVE-2026-28562 and CVE-2026-1581)
CVE-2026-28562 targets the Topics::get_topics() function where the ORDER BY clause relies on esc_sql() sanitization that doesn't actually protect against injection in unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials.
CVE-2026-1581 is a time-based SQL injection variant affecting the same wpfob parameter across all versions through 2.4.14. The function lacks prepared statements, letting attackers append queries that extract information by measuring response delays.
Both attacks work against default wpForo configurations with no prerequisite access. Automated exploitation is straightforward once the injection point is identified.
PHP Object Injection (CVE-2026-0910)
CVE-2026-0910 exists in versions through 2.4.13 due to unsafe deserialization in the wpforo_display_array_data function. Authenticated attackers with subscriber-level access can inject malicious PHP objects that—depending on the plugin chain available on the target site—could escalate to remote code execution.
The patch for this appeared in version 2.4.14, but that same version introduced the SQL injection flaws. Sites that upgraded to fix object injection now face a different critical vulnerability.
Authorization Bypass Flaws
Three additional CVEs affect wpForo 2.4.14's authorization model:
CVE-2026-28557: Authenticated users can trigger bulk usergroup reassignment via the wpforo_synch_roles AJAX handler. Attackers obtain a nonce from the usergroups admin page, then remap all wpForo usergroups to arbitrary WordPress roles—potentially escalating privileges site-wide.
CVE-2026-28554: Subscribers can approve or unapprove any forum post through the wpforo_approve_ajax handler. The check relies solely on nonce validation, ignoring whether the user has moderator permissions.
CVE-2026-28556: Authenticated subscribers can move, merge, or split any forum topic via topic_move, topic_merge, and topic_split handlers. Again, nonce-only validation allows content manipulation without proper authorization.
Information Disclosure (CVE-2026-28559)
CVE-2026-28559 lets unauthenticated users retrieve private and unapproved topics through the global RSS feed endpoint. Requesting the feed without a forum ID parameter bypasses privacy and status WHERE clauses, exposing content that should remain hidden.
Stored XSS (CVE-2026-28561)
Administrators can inject persistent JavaScript through forum description fields. The XSS echoes across multiple theme template files without output escaping. While requiring admin access to exploit, it enables privilege persistence and could facilitate attacks against other administrators.
What Admins Should Do
The vulnerability disclosure creates a difficult situation. Version 2.4.13 has the PHP object injection flaw. Version 2.4.14 has the SQL injection and authorization bypass flaws. No fully patched version exists as of this writing.
For WordPress sites running wpForo that can't afford to disable the plugin:
- Implement WAF rules blocking SQL injection patterns in the
wpfobparameter - Restrict forum access to authenticated users only where possible
- Monitor database queries for suspicious extraction patterns
- Disable the RSS feed functionality to prevent CVE-2026-28559
This situation echoes the WordPress plugin vulnerability surge we've tracked throughout 2026. The CleanTalk plugin CVE-2026-1490 auth bypass two weeks ago and the ACF Extended admin takeover flaw show the pattern continuing.
Site operators should monitor wpForo's changelog for a patched release and apply it immediately when available. Until then, consider whether the forum functionality justifies the exposure.
Related Articles
ImageMagick Zero-Days Enable RCE on Linux, WordPress via Image Upload
AI-discovered vulnerabilities bypass all security policies including 'secure' mode. Most servers won't receive fixes until 2027 without manual intervention.
Apr 6, 2026Attackers Exploiting FortiClient EMS SQLi Flaw in the Wild
CVE-2026-21643 exploitation began March 26, six weeks after Fortinet's patch. Around 1,000 internet-exposed EMS instances remain vulnerable to unauthenticated RCE.
Mar 31, 2026800K Sites at Risk from Smart Slider 3 File Read Flaw
CVE-2026-3098 lets subscribers read wp-config.php and any server file. Amelia Booking Pro also patched for admin password reset bug. Update these WordPress plugins now.
Mar 29, 2026Fortinet Patches 11 Flaws in FortiManager, FortiAnalyzer, FortiSandbox
Fortinet's March 2026 security advisory addresses 11 vulnerabilities including auth bypass, SQL injection, and buffer overflow flaws affecting enterprise management products.
Mar 22, 2026