LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-2991 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 19, 2026

KiviCare - Authentication Bypass

Published: March 18, 2026Updated: March 19, 2026PoC AvailableRemote Exploitable

Overview

KiviCare – Clinic & Patient Management System (EHR) WordPress plugin <= 4.1.2 contains an authentication bypass caused by patientSocialLogin() not verifying social provider access tokens, letting unauthenticated attackers log in as any patient, exploit requires crafted access token and email.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 16.0%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can access sensitive patient data and potentially administrative sessions, leading to data breach and unauthorized access.

Mitigation

Update to a version later than 4.1.2 or apply vendor patches.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 18, 2026

šŸ”“ CVE-2026-2991 - Critical (9.8) The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-2991/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-2991
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
unconfirmed
EPSS
16.0%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

16.0%Probability of exploitation in the next 30 days