Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-2020

CVE-2026-2020: JS Archive List WordPress Plugin RCE Flaw

CVE-2026-2020 is a PHP Object Injection flaw in the JS Archive List WordPress plugin that can lead to remote code execution. Authenticated attackers with Contributor access can exploit this. Learn about affected versions and fixes.

Published: March 13, 2026

CVE-2026-2020 Overview

The JS Archive List plugin for WordPress contains a PHP Object Injection vulnerability in all versions up to and including 6.1.7. This vulnerability exists due to unsafe deserialization of user-supplied input through the included shortcode attribute. Authenticated attackers with Contributor-level access or higher can exploit this flaw to inject malicious PHP objects into the application.

Critical Impact

If a Property-Oriented Programming (POP) chain exists via an additional plugin or theme installed on the target system, attackers could delete arbitrary files, retrieve sensitive data, or achieve remote code execution.

Affected Products

  • JS Archive List plugin for WordPress versions up to and including 6.1.7
  • WordPress sites using the vulnerable shortcode functionality
  • Systems with additional plugins or themes containing exploitable POP chains

Discovery Timeline

  • 2026-03-07 - CVE CVE-2026-2020 published to NVD
  • 2026-03-09 - Last updated in NVD database

Technical Details for CVE-2026-2020

Vulnerability Analysis

This vulnerability is classified as CWE-502: Deserialization of Untrusted Data. The JS Archive List plugin fails to properly sanitize user input before passing it to PHP's deserialization functions. The vulnerable code path exists within the plugin's shortcode handler, specifically when processing the included attribute parameter.

PHP Object Injection vulnerabilities occur when an application deserializes attacker-controlled data without proper validation. While the vulnerable plugin itself does not contain a known POP (Property-Oriented Programming) chain, the presence of other plugins or themes on the WordPress installation could provide gadget chains that enable full exploitation. This is a common attack pattern in WordPress environments where multiple plugins coexist, potentially creating unintended attack surfaces through class inheritance and magic method interactions.

The attack requires authentication with at least Contributor-level privileges, meaning attackers must have valid credentials to an account that can create or edit posts with shortcodes. This authentication requirement reduces the attack surface but does not eliminate the risk, as compromised contributor accounts or malicious insiders could exploit this vulnerability.

Root Cause

The root cause is improper handling of the included parameter within the plugin's shortcode processing logic. The vulnerable code in class-jq-archive-list-widget.php (line 674) and class-js-archive-list-settings.php accepts serialized data from user input and passes it directly to PHP's unserialize() function without implementing proper input validation or using safe deserialization practices such as allowed class restrictions.

Attack Vector

The attack is network-based and requires authentication with Contributor-level access. An attacker would craft a malicious serialized PHP object and inject it through the included shortcode attribute when creating or editing content. The serialized payload would be processed by the vulnerable deserialization function, instantiating the attacker-controlled object.

When a suitable POP chain exists on the target system, the magic methods (__wakeup(), __destruct(), __toString(), etc.) of the injected object can be leveraged to execute arbitrary operations. The exploitation complexity is considered high due to the requirement of an additional POP chain being present on the target system.

Detection Methods for CVE-2026-2020

Indicators of Compromise

  • Unusual or malformed shortcode attributes containing serialized PHP object notation (e.g., O:, a:, s: patterns) in post content
  • Unexpected file system modifications or deletions on the WordPress server
  • Suspicious database queries or data exfiltration attempts originating from the web application
  • Error logs containing PHP deserialization warnings or exceptions

Detection Strategies

  • Implement web application firewall (WAF) rules to detect serialized PHP object patterns in HTTP POST requests to WordPress
  • Monitor WordPress audit logs for unusual shortcode usage patterns by contributor-level users
  • Deploy file integrity monitoring on critical WordPress directories to detect unauthorized modifications
  • Review database content for posts containing suspicious serialized object strings in shortcode attributes

Monitoring Recommendations

  • Enable verbose PHP error logging and monitor for deserialization-related exceptions
  • Configure SIEM alerts for patterns matching PHP serialized object injection attempts
  • Implement regular security scanning of WordPress installations using plugins like Wordfence
  • Monitor user account activity for contributors making unusual content modifications

How to Mitigate CVE-2026-2020

Immediate Actions Required

  • Update the JS Archive List plugin to a patched version beyond 6.1.7 immediately
  • Audit all contributor and higher-level user accounts for signs of compromise
  • Review WordPress posts and pages for malicious shortcode content
  • Consider temporarily disabling the plugin until a patch is applied

Patch Information

The vulnerability was identified in the plugin's widget and settings classes. The WordPress Change Set contains the security fix addressing this issue. Administrators should update to the latest version available through the WordPress plugin repository. For detailed vulnerability information, refer to the Wordfence Vulnerability Report.

Workarounds

  • Restrict contributor-level access to trusted users only until the plugin is patched
  • Implement server-side input filtering to reject serialized PHP object patterns in shortcode attributes
  • Deploy a web application firewall with rules specifically targeting PHP object injection patterns
  • Remove the JS Archive List plugin temporarily if shortcode functionality is not critical to operations
bash
# Configuration example - Disable plugin via WP-CLI
wp plugin deactivate jquery-archive-list-widget

# Scan for suspicious serialized objects in post content
wp db query "SELECT ID, post_title FROM wp_posts WHERE post_content LIKE '%O:%' OR post_content LIKE '%included%unserialize%'"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechWordpress

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • WordPress Widget Class Code

  • WordPress Settings Class Code

  • WordPress Widget Class Code

  • WordPress Settings Class Code

  • WordPress Change Set Details

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-3844: WordPress Breeze Cache Plugin RCE Flaw

  • CVE-2026-6518: WordPress CMP Plugin RCE Vulnerability

  • CVE-2026-5718: WordPress CF7 File Upload RCE Vulnerability

  • CVE-2026-5797: Quiz And Survey Master WordPress RCE Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English