The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Davidfcarr
Davidfcarr quick Playground Wordpress Wordpress wordpress |
|
| Vendors & Products |
Davidfcarr
Davidfcarr quick Playground Wordpress Wordpress wordpress |
Thu, 09 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server. | |
| Title | Quick Playground <= 1.3.1 - Missing Authorization to Unauthenticated Arbitrary File Upload | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-09T13:34:45.661Z
Reserved: 2026-02-03T14:35:29.820Z
Link: CVE-2026-1830
Updated: 2026-04-09T13:34:40.234Z
Status : Received
Published: 2026-04-09T05:16:03.420
Modified: 2026-04-09T05:16:03.420
Link: CVE-2026-1830
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:05Z