[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":3,"vulnerability-29272":10,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":39,"all-banners":45,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":136},["Island",4],{"key":5,"params":6,"result":8},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":7},"{}",{"head":9},{},{"id":11,"detectable_with":12,"vuln_details":19,"vuln_id":36,"name":37,"published":38,"updated":20},29272,{"tool":13,"engine":16},{"id":14,"name":15},1,"Network Scanner",{"id":17,"name":18},2,"Nuclei",{"id":11,"codename":20,"description":20,"severity":21,"risk_description":22,"public_description":23,"public_recommendation":24,"recommendation":20,"references":25,"cvssv3":29,"epss_score":30,"epss_percentile":31,"cve":32,"in_cisa_catalog":34,"date":35,"software_type":20,"vendor":20,"product":20,"ptt_exploit_capabilities":20},null,"medium","Unauthenticated attackers can access and modify plugin settings, potentially compromising site integrity and data.","Widgets for Social Photo Feed WordPress plugin \u003C= 1.8 contains a broken access control caused by missing capability checks on specific REST API endpoints, letting unauthenticated attackers access and modify plugin settings remotely.","Update to the latest version beyond 1.8",[26,27,28],"https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/social-photo-feed-widget/widgets-for-social-photo-feed-18-missing-authentication-to-unauthenticated-plugin-settings-accessupdate-via-trustindex-feed-hook-instagram-rest-api-endpoints","https://wordpress.org/plugins/social-photo-feed-widget/","https://nvd.nist.gov/vuln/detail/CVE-2025-14726",6.5,0.00019,0.05326,[33],"CVE-2025-14726",false,"2026-05-02T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2025-14726","WordPress Widgets for Social Photo Feed \u003C= 1.8 - Information Disclosure","2026-05-06T00:00:00Z",["Island",40],{"key":41,"params":42,"result":43},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":7},{"head":44},{},[46,55,62,69,76,83,90,97,102,109,114,120,125,130],{"title":47,"slug":48,"text":49,"link":50,"external":34,"targets":51,"cta":53,"variant":54,"campaign_id":20},"Compliance - Advanced Pentest Reporting","compliance-advanced-pentest-reporting","Prove your compliance. Get built-in validation with audit-ready reports.","https://pentest-tools.com/pricing",[52],"/features/advanced-pentest-reporting","Unlock audit-ready reports","primary",{"title":56,"slug":57,"text":58,"link":50,"external":34,"targets":59,"cta":61,"variant":54,"campaign_id":20},"Compliance - Integrations","compliance-integrations","Disconnected tools hide compliance breaches. Stay audit-ready 24/7 with the right integrations.",[60],"/features/integrations","Automate your compliance",{"title":63,"slug":64,"text":65,"link":50,"external":34,"targets":66,"cta":68,"variant":54,"campaign_id":20},"Compliance - ML Classifier","compliance-ml-classifier","Put compliance on Auto this year with 50% fewer FPs. Go deeper with the WebNetSec plan.",[67],"/features/machine-learning-classifier","Explore WebNetSec",{"title":70,"slug":71,"text":72,"link":50,"external":34,"targets":73,"cta":75,"variant":54,"campaign_id":20},"Compliance - Pentest Robots","compliance-pentest-robots","Put compliance on Auto with Pentest Robots. Available with any plan.",[74],"/features/pentest-robots","Automate continuous scans",{"title":77,"slug":78,"text":79,"link":50,"external":34,"targets":80,"cta":82,"variant":54,"campaign_id":20},"Compliance - Sniper: Auto-Exploiter","compliance-sniper-auto-exploiter","Get audit-ready proof and put compliance on Auto with our proprietary Sniper: Auto-exploiter. Available with Pentest Suite.",[81],"/exploit-helpers/sniper","Get proof with Pentest Suite",{"title":84,"slug":85,"text":86,"link":50,"external":34,"targets":87,"cta":89,"variant":54,"campaign_id":20},"Compliance - Network Scanner","compliance-network-scanner","Map your attack surface and prove infrastructure compliance with the Network Scanner. Available with any plan.",[88],"/network-vulnerability-scanning/network-security-scanner-online","Upgrade your plan",{"title":91,"slug":92,"text":93,"link":50,"external":34,"targets":94,"cta":96,"variant":54,"campaign_id":20},"Compliance - Website Scanner","compliance-website-scanner","Prove real risk instantly and put compliance on Auto with the Website Scanner. Available with the WebNetSec plan.",[95],"/website-vulnerability-scanning/website-scanner","Unlock AppSec compliance",{"title":98,"slug":99,"text":100,"link":50,"external":34,"targets":101,"cta":53,"variant":54,"campaign_id":20},"Compliance - Advanced Pentest Reporting (A-B test)","compliance-advanced-pentest-reporting-1","Stop piecing together reports manually. Upgrade today to unlock instant proof for audits.",[52],{"title":103,"slug":104,"text":105,"link":50,"external":34,"targets":106,"cta":107,"variant":108,"campaign_id":20},"Compliance - Integrations (A-B test)","compliance-integrations-1","Disconnected tools will fail your next audit. Unlock the integrations needed for compliance.",[60],"Connect your stack","secondary",{"title":110,"slug":111,"text":112,"link":50,"external":34,"targets":113,"cta":68,"variant":54,"campaign_id":20},"Compliance - ML Classifier (A-B test)","compliance-ml-classifier-1","Ghost vulnerabilities drain time and chip your compliance. Upgrade to WebNetSec to stay audit-ready with 50% fewer FPs.",[67],{"title":115,"slug":116,"text":117,"link":50,"external":34,"targets":118,"cta":119,"variant":54,"campaign_id":20},"Compliance - Network Scanner (A-B test)","compliance-network-scanner-1","Unmapped assets are compliance landmines - upgrade your plan with complete attack surface visibility.",[88],"Get deep network scans",{"title":121,"slug":122,"text":123,"link":50,"external":34,"targets":124,"cta":75,"variant":54,"campaign_id":20},"Compliance - Pentest Robots (A-B test)","compliance-pentest-robots-1","Don’t leave compliance to chance - deploy Pentest Robots to quickly automate your audit readiness.",[74],{"title":126,"slug":127,"text":128,"link":50,"external":34,"targets":129,"cta":82,"variant":54,"campaign_id":20},"Compliance - Sniper: Auto-Exploiter (A-B test)","compliance-sniper-auto-exploiter-1","Deliver audit-ready proof instantly and stay compliant 24/7/365 - only with Sniper: Auto-Exploiter. Available with Pentest Suite.",[81],{"title":131,"slug":132,"text":133,"link":50,"external":34,"targets":134,"cta":135,"variant":54,"campaign_id":20},"Compliance - Website Scanner (A-B test)","compliance-website-scanner-1","Web vulnerabilities let in devastating compliance fines. Stay audit-ready with deep, proprietary scans. Available with the WebNetSec plan.",[95],"Upgrade to WebNetSec",["Island",137],{"key":138,"params":139,"result":141},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":140},"{\"text-color\":\"gray\"}",{"head":142},{}]