Description
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the greenshift_app_pass_validation() function in all versions up to, and including, 12.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve global plugin settings including stored AI API keys and modify plugin settings, including the injection of arbitrary web scripts via the 'custom_css' value (stored XSS). NOTE: This vulnerability was partially patched in version 12.6.
INFO
Published Date :
2026-02-05T13:27:37.702Z
Last Modified :
2026-04-08T16:59:37.374Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1927 vulnerability.
| Vendors | Products |
|---|---|
| Wordpress |
|
| Wpsoul |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1927.