このページはまだあなたの言語に翻訳されていません。翻訳作業中のため、英語でコンテンツを表示しています。
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-34901: Privilege Escalation in iControlWP
プラットフォーム
wordpress
コンポーネント
worpit-admin-dashboard-plugin
修正版
5.5.4
CVE-2026-34901 is a critical Privilege Escalation vulnerability affecting the iControlWP plugin for WordPress. An unauthenticated attacker can exploit this flaw to elevate their privileges to that of a WordPress administrator, granting them full control over the site. This vulnerability impacts versions of iControlWP up to and including 5.5.3, and a patch is available in version 5.5.4.
このCVEがあなたのプロジェクトに影響するか確認
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
影響と攻撃シナリオ翻訳中…
Successful exploitation of CVE-2026-34901 allows an attacker to bypass authentication and directly assume administrator privileges on a WordPress site. This grants them complete control, including the ability to install malicious plugins, modify themes, steal sensitive data (user credentials, customer information, financial data), deface the website, and potentially pivot to other systems on the network. The blast radius extends to all data and functionality accessible through the WordPress installation. Given the widespread use of WordPress and the plugin's management capabilities, this vulnerability poses a significant risk to a large number of websites.
悪用の状況翻訳中…
CVE-2026-34901 has been published relatively recently (2026-04-07), and its EPSS score is likely to be assessed as medium to high due to the critical CVSS score and the ease of exploitation (unauthenticated). Public proof-of-concept (POC) code is likely to emerge, increasing the risk of widespread exploitation. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting iControlWP.
脅威インテリジェンス
エクスプロイト状況
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化なし — 影響は脆弱なコンポーネントのみ。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- 高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 公開日
- 更新日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-34901 is to immediately upgrade the iControlWP plugin to version 5.5.4 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling the iControlWP plugin to reduce the attack surface. While a direct WAF rule is unlikely to be effective against privilege escalation, implementing strict access controls and regularly auditing user permissions can help limit the impact of a successful breach. After upgrading, verify the fix by attempting to access administrative functions without proper authentication; successful access indicates the vulnerability persists.
修正方法
バージョン5.5.4、またはそれ以降の修正されたバージョンにアップデートしてください
よくある質問翻訳中…
What is CVE-2026-34901 — Privilege Escalation in iControlWP?
CVE-2026-34901 is a critical vulnerability in the iControlWP WordPress plugin allowing unauthenticated attackers to gain administrator privileges. This means an attacker can take complete control of the WordPress site without needing a username or password.
Am I affected by CVE-2026-34901 in iControlWP?
Yes, if you are using iControlWP version 5.5.3 or earlier, you are vulnerable. Check your plugin version using wp plugin list and upgrade immediately.
How do I fix CVE-2026-34901 in iControlWP?
Upgrade the iControlWP plugin to version 5.5.4 or later. If immediate upgrade is not possible, temporarily disable the plugin to reduce your risk.
Is CVE-2026-34901 being actively exploited?
While no active exploitation has been publicly confirmed, the vulnerability's critical severity and ease of exploitation suggest it is likely to be targeted. Monitor security advisories and threat intelligence.
Where can I find the official iControlWP advisory for CVE-2026-34901?
Refer to the iControlWP website and WordPress plugin repository for the latest security advisory and update information: [https://www.icontrolwp.com/](https://www.icontrolwp.com/)
このCVEがあなたのプロジェクトに影響するか確認
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
WordPressプロジェクトを今すぐスキャン — アカウント不要
Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...