LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-5130 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 1, 2026

WordPress Debugger & Troubleshooter - Privilege Escalation

Published: March 30, 2026Updated: April 1, 2026Remote Exploitable

Overview

WordPress Debugger & Troubleshooter plugin <= 1.3.2 contains an unauthenticated privilege escalation caused by accepting wp_debug_troubleshoot_simulate_user cookie as user ID without validation, letting unauthenticated attackers impersonate any user including administrators, exploit requires no authentication.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 2.2%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can gain administrator access, allowing full site control including content modification and plugin installation.

Mitigation

Update to version 1.4.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 30, 2026

🟠 CVE-2026-5130 - High (8.8) The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to and including 1.3.2. This was due to the plugin accepting the wp_debug_troubleshoot_simulate_user cookie value directly as ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-5130/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-5130
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
unconfirmed
EPSS
2.2%
Social Posts
1

CWE

  • CWE-565

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

2.2%Probability of exploitation in the next 30 days