WordPress Quick Playground 1.3.1 RCE via REST API
CVE-2026-1830 Published on April 9, 2026

Quick Playground <= 1.3.1 - Missing Authorization to Unauthenticated Arbitrary File Upload
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.

NVD

Timeline

Vendor Notified

Disclosed 64 days later.

Weakness Type

What is an AuthZ Vulnerability?

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

CVE-2026-1830 has been classified to as an AuthZ vulnerability or weakness.


Affected Versions

davidfcarr Quick Playground:

Exploit Probability

EPSS
0.18%
Percentile
39.45%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.