Vulnerability Description
The WP ULike plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.8.3.1. This is due to the `wp_ulike_delete_history_api` AJAX action not verifying that the log entry being deleted belongs to the current user. This makes it possible for authenticated attackers, with Subscriber-level access and above (granted the 'stats' capability is assigned to their role), to delete arbitrary log entries belonging to other users via the 'id' parameter.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.8.3.1/admin/admin-aja
- https://plugins.trac.wordpress.org/browser/wp-ulike/trunk/admin/admin-ajax.php#L
- https://plugins.trac.wordpress.org/changeset/3451296/wp-ulike/trunk/admin/admin-
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bee2e520-46cc-4b54-984
FAQ
What is CVE-2026-0909?
CVE-2026-0909 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The WP ULike plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.8.3.1. This is due to the `wp_ulike_delete_history_api` AJAX action not veri...
How severe is CVE-2026-0909?
CVE-2026-0909 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0909?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.