Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.3

Kadence WP plugin exposes sensitive data through malicious server requests

CVE-2026-1857
Summary

The Kadence WP plugin for WordPress allows attackers with Contributor-level access and above to make unauthorized server requests, potentially exposing sensitive data like contacts, campaigns, and mailing lists. This is due to a lack of proper validation in the plugin's API settings. To fix this, update the Kadence WP plugin to version 3.6.2 or later.

Original title
The Gutenberg Blocks with AI by Kadence WP plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.6.1. This is due to insufficient validation of t...
Original description
The Gutenberg Blocks with AI by Kadence WP plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.6.1. This is due to insufficient validation of the `endpoint` parameter in the `get_items()` function of the GetResponse REST API handler. The endpoint's permission check only requires `edit_posts` capability (Contributor role) rather than `manage_options` (Administrator). This makes it possible for authenticated attackers, with Contributor-level access and above, to make server-side requests to arbitrary endpoints on the configured GetResponse API server, retrieving sensitive data such as contacts, campaigns, and mailing lists using the site's stored API credentials. The stored API key is also leaked in the request headers.
nvd CVSS3.1 4.3
Vulnerability type
CWE-918 Server-Side Request Forgery (SSRF)
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026