Deze pagina is nog niet vertaald naar uw taal. We werken eraan — de inhoud wordt voorlopig in het Engels weergegeven.

💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.

CRITICALCVE-2026-34901CVSS 9.8

CVE-2026-34901: Privilege Escalation in iControlWP

wordt vertaald…

Platform

wordpress

Component

worpit-admin-dashboard-plugin

Opgelost in

5.5.4

Wordt vertaald naar uw taal…

CVE-2026-34901 is a critical Privilege Escalation vulnerability affecting the iControlWP plugin for WordPress. An unauthenticated attacker can exploit this flaw to elevate their privileges to that of a WordPress administrator, granting them full control over the site. This vulnerability impacts versions of iControlWP up to and including 5.5.3, and a patch is available in version 5.5.4.

WordPress

Detecteer deze CVE in je project

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

Impact en Aanvalsscenarioswordt vertaald…

Successful exploitation of CVE-2026-34901 allows an attacker to bypass authentication and directly assume administrator privileges on a WordPress site. This grants them complete control, including the ability to install malicious plugins, modify themes, steal sensitive data (user credentials, customer information, financial data), deface the website, and potentially pivot to other systems on the network. The blast radius extends to all data and functionality accessible through the WordPress installation. Given the widespread use of WordPress and the plugin's management capabilities, this vulnerability poses a significant risk to a large number of websites.

Uitbuitingscontextwordt vertaald…

CVE-2026-34901 has been published relatively recently (2026-04-07), and its EPSS score is likely to be assessed as medium to high due to the critical CVSS score and the ease of exploitation (unauthenticated). Public proof-of-concept (POC) code is likely to emerge, increasing the risk of widespread exploitation. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting iControlWP.

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityHighRisico op blootstelling van gevoelige dataIntegrityHighRisico op ongeautoriseerde gegevenswijzigingAvailabilityHighRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
Integrity
Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
Availability
Hoog — volledige crash of uitputting van resources. Totale denial of service.

Getroffen Software

Componentworpit-admin-dashboard-plugin
Leverancierwordfence
Maximumversie5.5.3
Opgelost in5.5.4

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gepubliceerd
  2. Gewijzigd

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2026-34901 is to immediately upgrade the iControlWP plugin to version 5.5.4 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling the iControlWP plugin to reduce the attack surface. While a direct WAF rule is unlikely to be effective against privilege escalation, implementing strict access controls and regularly auditing user permissions can help limit the impact of a successful breach. After upgrading, verify the fix by attempting to access administrative functions without proper authentication; successful access indicates the vulnerability persists.

Hoe te verhelpenwordt vertaald…

Update to version 5.5.4, or a newer patched version

Veelgestelde vragenwordt vertaald…

What is CVE-2026-34901 — Privilege Escalation in iControlWP?

CVE-2026-34901 is a critical vulnerability in the iControlWP WordPress plugin allowing unauthenticated attackers to gain administrator privileges. This means an attacker can take complete control of the WordPress site without needing a username or password.

Am I affected by CVE-2026-34901 in iControlWP?

Yes, if you are using iControlWP version 5.5.3 or earlier, you are vulnerable. Check your plugin version using wp plugin list and upgrade immediately.

How do I fix CVE-2026-34901 in iControlWP?

Upgrade the iControlWP plugin to version 5.5.4 or later. If immediate upgrade is not possible, temporarily disable the plugin to reduce your risk.

Is CVE-2026-34901 being actively exploited?

While no active exploitation has been publicly confirmed, the vulnerability's critical severity and ease of exploitation suggest it is likely to be targeted. Monitor security advisories and threat intelligence.

Where can I find the official iControlWP advisory for CVE-2026-34901?

Refer to the iControlWP website and WordPress plugin repository for the latest security advisory and update information: [https://www.icontrolwp.com/](https://www.icontrolwp.com/)

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

WordPress

Detecteer deze CVE in je project

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

livefree scan

Scan nu uw WordPress project — geen account

Upload een manifest (composer.lock, package-lock.json, WordPress pluginlijst…) of plak uw componentenlijst. U ontvangt direct een kwetsbaarheidsrapport. Een bestand uploaden is slechts het begin: met een account krijgt u continue monitoring, Slack/e-mail alerts, multi-project en white-label rapporten.

Manual scanSlack/email alertsscanZone.capMonitorWhite-label reports

Sleep uw afhankelijkheidsbestand hierheen

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...

CVE-2026-34901 — Vulnerability Details | NextGuard