The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts.
References
Link Providers
https://www.spirityenterprise.com/virtual-ciso spirity
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/Ajax/Post.php#L2178 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/Ajax/Post.php#L2183 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/Ajax/Post.php#L2273 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/Ajax/Post.php#L2322 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/B2S/Post/Tools.php#L32 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/B2S/Ship/Save.php#L190 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/tags/8.8.2/includes/Loader.php#L2202 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Ajax/Post.php#L2178 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Ajax/Post.php#L2183 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Ajax/Post.php#L2273 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Ajax/Post.php#L2322 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/B2S/Post/Tools.php#L32 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/B2S/Ship/Save.php#L190 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Loader.php#L2202 cve-icon cve-icon
https://plugins.trac.wordpress.org/changeset/3494550/ cve-icon cve-icon
https://www.wordfence.com/threat-intel/vulnerabilities/id/f3eec9c6-fef9-4d6e-8328-51efb997c99c?source=cve cve-icon cve-icon
History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Pr-gateway
Pr-gateway blog2social: Social Media Auto Post & Scheduler
Wordpress
Wordpress wordpress
Vendors & Products Pr-gateway
Pr-gateway blog2social: Social Media Auto Post & Scheduler
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts.
Title Blog2Social: Social Media Auto Post & Scheduler <= 8.8.3 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Schedule Modification via 'b2s_id' Parameter
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:59.960Z

Reserved: 2026-03-17T13:51:34.020Z

Link: CVE-2026-4330

cve-icon Vulnrichment

Updated: 2026-04-08T14:18:30.610Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T08:16:23.733

Modified: 2026-04-08T21:26:35.910

Link: CVE-2026-4330

cve-icon Redhat

No data.