{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T10:08:32.723","vulnerabilities":[{"cve":{"id":"CVE-2026-2504","sourceIdentifier":"security@wordfence.com","published":"2026-02-19T07:17:46.740","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Dealia – Request a quote plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on multiple AJAX handlers in all versions up to, and including, 1.0.7. The admin nonce (DEALIA_ADMIN_NONCE) is exposed to all users with edit_posts capability (Contributor+) via wp_localize_script() in PostsController.php, while the AJAX handlers in AdminSettingsController.php only verify the nonce without checking current_user_can('manage_options'). This makes it possible for authenticated attackers, with Contributor-level access and above, to reset the plugin configuration."},{"lang":"es","value":"El plugin Dealia – Request a quote para WordPress es vulnerable a la modificación no autorizada de datos debido a la falta de comprobaciones de capacidad en múltiples manejadores AJAX en todas las versiones hasta la 1.0.6, inclusive. El nonce de administrador (DEALIA_ADMIN_NONCE) está expuesto a todos los usuarios con capacidad edit_posts (Colaborador+) a través de wp_localize_script() en PostsController.PHP, mientras que los manejadores AJAX en AdminSettingsController.PHP solo verifican el nonce sin comprobar current_user_can('manage_options'). Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, restablezcan la configuración del plugin."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/tags/1.0.6/src/Controllers/AdminSettingsController.php#L243","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/tags/1.0.6/src/Controllers/AdminSettingsController.php#L309","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/tags/1.0.6/src/Controllers/AdminSettingsController.php#L416","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/tags/1.0.6/src/Controllers/PostsController.php#L49","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/trunk/src/Controllers/AdminSettingsController.php#L243","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/dealia-request-a-quote/trunk/src/Controllers/PostsController.php#L49","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c8f506ef-972c-403d-9167-ffdd93be8ea6?source=cve","source":"security@wordfence.com"}]}}]}