Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.3

e-shot Form Builder Plugin Exposes Sensitive Info to All Authenticated Users

CVE-2026-3546
Summary

The e-shot form builder plugin for WordPress is vulnerable to unauthorized access to sensitive information. If an attacker is logged in with a subscriber account or above, they can extract the e-shot API token and access the victim's e-shot platform account. Update to version 1.0.3 or later to fix this issue.

Original title
The e-shot form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.2. The eshot_form_builder_get_account_data() function is regis...
Original description
The e-shot form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.2. The eshot_form_builder_get_account_data() function is registered as a wp_ajax_ AJAX handler accessible to all authenticated users. The function lacks any capability check (e.g., current_user_can('manage_options')) and does not verify a nonce. It directly queries the database for the e-shot API token stored in the eshotformbuilder_control table and returns it along with all subaccount data as a JSON response. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the e-shot API token and subaccount information, which could then be used to access the victim's e-shot platform account.
nvd CVSS3.1 5.3
Vulnerability type
CWE-202
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026