Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32367 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Remote Code Execution (RCE) via Code Injection in WordPress plugin 'Modal Dialog'.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-94 (Code Injection). <br>πŸ” **Flaw**: Improper code generation control allows malicious input to be executed as server-side code.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin 'Modal Dialog'. <br>πŸ“… **Versions**: 3.5.16 and earlier. <br>πŸ‘€ **Vendor**: Yannick Lefebvre.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Remote Code Execution (RCE). <br>πŸ”“ **Privileges**: Full control over the web server context. <br>πŸ“‚ **Data**: Access to all site data, databases, and user credentials.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: Medium. <br>πŸ”‘ **Auth**: Requires High Privileges (PR:H). <br>πŸ–±οΈ **UI**: No User Interaction needed (UI:N). <br>🌐 **Network**: Network Accessible (AV:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exploit**: No specific PoC provided in data (pocs: []). <br>🌍 **Wild Exploitation**: Unknown, but CVSS score indicates high severity potential.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for 'Modal Dialog' plugin version 3.5.16 or lower. <br>πŸ› οΈ **Tooling**: Use vulnerability scanners targeting CWE-94 in WordPress plugins.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Update 'Modal Dialog' plugin to version > 3.5.16. <br>πŸ“ **Source**: Vendor patch available via Patchstack reference.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Disable the 'Modal Dialog' plugin immediately. <br>πŸ”’ **Mitigation**: Restrict admin access; remove plugin files if update is not possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. <br>πŸ“Š **CVSS**: 9.8 (Critical). <br>πŸš€ **Priority**: Patch immediately upon update availability. Do not ignore.