Description
The Export All URLs WordPress plugin before 5.1 generates CSV filenames containing posts URLS (including private posts) in a predictable pattern using a random 6-digit number. These files are stored in the publicly accessible wp-content/uploads/ directory. As a result, any unauthenticated user can brute-force the filenames to gain access to sensitive data contained within the exported files.
INFO
Published Date :
2026-04-01T06:00:08.236Z
Last Modified :
2026-04-01T14:02:38.139Z
Source :
WPScan
AFFECTED PRODUCTS
The following products are affected by CVE-2026-2696 vulnerability.
| Vendors | Products |
|---|---|
| Export All Urls |
|
| Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-2696.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact