CVE-2026-0554

4.3 MEDIUM

📋 TL;DR

The NotificationX WordPress plugin has a missing capability check vulnerability in REST API endpoints that allows authenticated users with Contributor-level access or higher to reset analytics for any campaign, regardless of ownership. This affects all versions up to and including 3.1.11. The vulnerability enables unauthorized data modification within WordPress sites using this plugin.

💻 Affected Systems

Products:
  • NotificationX WordPress Plugin
Versions: All versions up to and including 3.1.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with NotificationX plugin enabled and at least one user with Contributor role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could systematically reset analytics for all campaigns, disrupting business intelligence and reporting capabilities, potentially combined with other vulnerabilities for broader impact.

🟠

Likely Case

Contributor-level users resetting analytics for campaigns they don't own, causing data loss and inaccurate reporting for site administrators.

🟢

If Mitigated

Limited to authenticated users with at least Contributor access, with impact confined to analytics data reset rather than content modification or privilege escalation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via REST API calls to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.12 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3433555%40notificationx&old=3426659%40notificationx&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find NotificationX and click 'Update Now' if available. 4. Alternatively, download version 3.1.12+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily limit Contributor and Author role access or remove unnecessary users until patch is applied.

Disable REST API Endpoints

all

Use WordPress filters to block access to vulnerable NotificationX REST endpoints.

Add to theme's functions.php or custom plugin:
add_filter('rest_endpoints', function($endpoints){
    if(isset($endpoints['/notificationx/v1/regenerate'])) unset($endpoints['/notificationx/v1/regenerate']);
    if(isset($endpoints['/notificationx/v1/reset'])) unset($endpoints['/notificationx/v1/reset']);
    return $endpoints;
});

🧯 If You Can't Patch

  • Disable NotificationX plugin entirely if not critical
  • Implement strict user role management and audit Contributor-level users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → NotificationX → Version. If version is 3.1.11 or lower, system is vulnerable.

Check Version:

wp plugin list --name=notificationx --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm NotificationX version is 3.1.12 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-json/notificationx/v1/regenerate or /wp-json/notificationx/v1/reset endpoints from non-admin users
  • Multiple analytics reset events in short timeframes

Network Indicators:

  • REST API calls to NotificationX endpoints from unauthorized user roles

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/notificationx/v1/regenerate" OR uri_path="/wp-json/notificationx/v1/reset") AND user_role!="administrator"

🔗 References

📤 Share & Export