HIGHVulnerability
Verified
Global

Critical WordPress Plugin Vulnerability Affects 5 Million Sites

Sunday, March 8, 2026 at 12:00 PM UTC·Source: WPScan / Wordfence

Updated: Monday, March 9, 2026 at 08:00 AM UTC

Executive Summary

Unauthenticated SQL injection in a top WordPress security plugin allows database takeover. 5 million active installations at risk.

Analysis

CVE-2026-8001 is an unauthenticated SQL injection vulnerability in a widely-used WordPress security plugin with over 5 million active installations. Attackers can extract admin credentials, modify database content, or create backdoor admin accounts. WPScan detected active exploitation within 24 hours of disclosure. Plugin vendor released a patch but adoption is slow.

Timeline

Discovered
Mar 6, 2026
Exploitation Detected
Mar 7, 2026
Published
Mar 8, 2026
Patch Available
Mar 7, 2026

Indicators of Compromise (1)

CVE (1)
CVE-2026-8001
Source Attribution

Originally published by WPScan / Wordfence on Mar 8, 2026. Verified by: WPScan, Wordfence, CISA.

Related Threats