CVE-2026-5753 Overview
CVE-2026-5753 is a Missing Authorization vulnerability [CWE-862] in the All-in-One WP Migration Unlimited Extension plugin for WordPress. The flaw affects all versions up to and including 2.83. The Ai1wmve_Schedules_Controller::save handler bound to admin_post_ai1wm_schedule_event_save does not verify user capabilities before saving schedule data. Authenticated users with subscriber-level access or higher can create scheduled export jobs and direct backup notifications to attacker-controlled email addresses. Because those notifications include the random backup filename, attackers can subsequently download full site backups from the target. The result is sensitive information exposure across the entire WordPress installation.
Critical Impact
Subscriber-level users can exfiltrate full WordPress site backups by hijacking scheduled export notifications.
Affected Products
- All-in-One WP Migration Unlimited Extension plugin for WordPress, versions up to and including 2.83
- WordPress sites operated by ServMask using the Unlimited Extension
- Any WordPress deployment allowing subscriber-level registration with this plugin enabled
Discovery Timeline
- 2026-05-06 - CVE-2026-5753 published to NVD
- 2026-05-06 - Last updated in NVD database
Technical Details for CVE-2026-5753
Vulnerability Analysis
The vulnerability resides in the Ai1wmve_Schedules_Controller::save method, which is registered as the handler for the admin_post_ai1wm_schedule_event_save action. WordPress exposes admin_post_* actions to any authenticated user by default. The handler accepts schedule configuration data, including the destination email address for backup notifications, and persists it without checking whether the requester holds an administrator capability such as manage_options or export. This authorization gap converts a privileged administrative function into a feature reachable by any logged-in subscriber.
Once a malicious schedule is saved, the plugin generates a backup archive on its normal cadence and emails the notification to the attacker-supplied address. The notification body contains the random filename component used to obscure backup downloads. With that filename, the attacker reconstructs the public download URL and retrieves the entire WordPress backup, including database contents, user records, and uploaded files.
Root Cause
The root cause is a missing capability check inside the save handler. The function does not call current_user_can() or an equivalent guard before processing the request. WordPress nonce verification alone, when present, only proves request authenticity — it does not enforce role-based authorization. The randomized backup filename was treated as a security boundary, but exposing it through user-controlled email destinations defeats that obscurity-based control.
Attack Vector
The attacker first registers or obtains a subscriber-level account on the target site. They then submit an authenticated POST request to /wp-admin/admin-post.php with the action parameter set to ai1wm_schedule_event_save and a schedule payload that specifies an attacker-controlled notification email. After the next scheduled export runs, the attacker receives the email containing the backup filename and downloads the archive directly from the target host.
No verified public exploit code is available. Refer to the Wordfence Vulnerability Report for additional technical context.
Detection Methods for CVE-2026-5753
Indicators of Compromise
- POST requests to /wp-admin/admin-post.php with the action parameter equal to ai1wm_schedule_event_save originating from non-administrator accounts
- Outbound backup notification emails sent to addresses outside the organization's known administrator list
- Unexpected entries in the All-in-One WP Migration schedules table referencing unfamiliar email recipients
- Web server access log entries showing downloads of .wpress backup archives from unauthenticated or unknown source IPs
Detection Strategies
- Audit the WordPress options table for plugin schedule entries and correlate notification email fields against the approved administrator roster
- Inspect web server access logs for admin-post.php requests where the requesting session belongs to a subscriber, contributor, or author role
- Monitor outbound SMTP traffic from the WordPress host for backup notification subjects sent to external domains
Monitoring Recommendations
- Alert on any HTTP request invoking ai1wm_schedule_event_save from sessions lacking the manage_options capability
- Track creation and modification events on All-in-One WP Migration schedule records and review them during weekly access reviews
- Forward WordPress and reverse proxy logs to a centralized SIEM and build a rule for retrieval of .wpress files from non-admin IP ranges
How to Mitigate CVE-2026-5753
Immediate Actions Required
- Update the All-in-One WP Migration Unlimited Extension plugin to a version newer than 2.83 once the vendor publishes a fix per the ServMask changelog
- Audit the WordPress user list and remove or downgrade unrecognized subscriber accounts
- Review existing scheduled export jobs and delete any whose notification email is not owned by an administrator
- Rotate WordPress administrator credentials and database secrets if backup exfiltration is suspected
Patch Information
ServMask maintains release notes for the Unlimited Extension at the ServMask Unlimited Extension Changelog. Apply the first vendor release that supersedes version 2.83 and explicitly references the missing authorization fix. Until that release is installed, treat the plugin as exposing a privileged action to all authenticated users.
Workarounds
- Disable the All-in-One WP Migration Unlimited Extension plugin until a patched version is installed
- Restrict access to /wp-admin/admin-post.php?action=ai1wm_schedule_event_save at the web server or WAF layer to administrator IP ranges
- Disable open user registration and require manual approval for new accounts to limit subscriber-level attackers
- Move existing backup archives off the public web root so leaked filenames cannot be retrieved over HTTP
# Example NGINX rule to block the vulnerable handler from non-admin sources
location = /wp-admin/admin-post.php {
if ($arg_action = "ai1wm_schedule_event_save") {
allow 203.0.113.0/24; # admin office range
deny all;
}
include fastcgi_params;
fastcgi_pass php-upstream;
}
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


