← back

CVE-2026-39609

MEDIUM · 5.3
hype MIXED · 58 hack

Real vuln, no KEV/patch, defensive chatter; unclear if mass scanning observed.

What: Missing authorization in Wava Payment WordPress plugin ≤0.3.7 exposes AJAX endpoints to unauthenticated access, allowing log export and settings tampering (CVSS 5.3 MEDIUM).

Why it matters: No patch released; attackers can extract logs and modify plugin settings without authentication. Not KEV-listed yet, but chatter emphasizes active risk—defenders advised to deploy WAF rules immediately. Real exposure window exists while vendor remains silent.

Where it's seen: Security researcher posting identical warnings across Twitter and Bluesky, linking to detailed advisory. Framing as "no patch" and urgent mitigation need suggests working knowledge of the flaw, though no explicit PoC code shared in excerpts.

RISK: MODERATE — Unauthenticated access to sensitive functions; no patch; low CVSS limits blast radius.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/3/2026, 8:45:53 AM
NVD details 1 CWE ·0 vendors · 1 ref expand

Description

Missing Authorization vulnerability in Wava.co Wava Payment wava-payment allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wava Payment: from n/a through <= 0.3.7.

Weaknesses

References

Top posts driving the trend