{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T01:15:49.025","vulnerabilities":[{"cve":{"id":"CVE-2026-0909","sourceIdentifier":"security@wordfence.com","published":"2026-02-03T04:15:56.013","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The WP ULike plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.8.3.1. This is due to the `wp_ulike_delete_history_api` AJAX action not verifying that the log entry being deleted belongs to the current user. This makes it possible for authenticated attackers, with Subscriber-level access and above (granted the 'stats' capability is assigned to their role), to delete arbitrary log entries belonging to other users via the 'id' parameter."},{"lang":"es","value":"El plugin WP ULike para WordPress es vulnerable a Referencia Directa Insegura a Objeto en todas las versiones hasta e incluyendo la 4.8.3.1. Esto se debe a que la acción AJAX 'wp_ulike_delete_history_api' no verifica que la entrada de registro que se está eliminando pertenezca al usuario actual. Esto hace posible que atacantes autenticados, con acceso de nivel Suscriptor y superior (siempre que la capacidad 'stats' esté asignada a su rol), eliminen entradas de registro arbitrarias pertenecientes a otros usuarios a través del parámetro 'id'."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.8.3.1/admin/admin-ajax.php#L94","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/wp-ulike/trunk/admin/admin-ajax.php#L94","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3451296/wp-ulike/trunk/admin/admin-ajax.php","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/bee2e520-46cc-4b54-9849-fafb9b37ba19?source=cve","source":"security@wordfence.com"}]}}]}