Cyber Posture

CVE-2026-1306

Critical

Published: 14 February 2026

Published
14 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2773 96.5th percentile
Risk Priority 36 60% EPSS · 20% KEV · 20% CVSS

Description

The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers…

more

to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identifying, reporting, and correcting the arbitrary file upload flaw in the midi-Synth WordPress plugin to eliminate the vulnerability.

prevent

Mandates validation of file types and extensions at the 'export' AJAX input point to block unauthenticated arbitrary file uploads.

preventdetect

Deploys malicious code protection mechanisms to scan and block potentially exploitable uploaded files before they enable remote code execution.

Security SummaryAI

CVE-2026-1306 is an arbitrary file upload vulnerability in the midi-Synth plugin for WordPress, affecting all versions up to and including 1.1.0. The flaw arises from missing file type and file extension validation in the 'export' AJAX action, allowing attackers to upload arbitrary files to the affected site's server. Published on 2026-02-14, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type).

Unauthenticated attackers can exploit this vulnerability remotely with low complexity, as a required nonce is trivially accessible via exposure in frontend JavaScript. Successful exploitation enables uploading malicious files, which may lead to remote code execution on the server.

References include source code locations in midiSynth.php (lines 110 and 121) and midiSynthConvert.php (lines 421 and 492) from version 1.1.0, along with a plugin repository changeset (3460788), indicating areas of the vulnerable code and a potential patch commit.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

CVE-2026-1306 allows unauthenticated arbitrary file upload in a public-facing WordPress plugin, enabling exploitation of public-facing applications (T1190) and deployment of web shells for RCE (T1100).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References