cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forgetgenie getgenie

Direction: descending
Apr 16, 2026

GetGenie – Ai Content Writer with Keyword Research and Competitor Analysis # CVE-2026-1003

CVE, Research URL

CVE-2026-1003

Date
Jan 16, 2026
Research Description
The GetGenie plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.3.0. This is due to the plugin not properly verifying that a user is authorized to delete a specific post. This makes it possible for authenticated attackers, with Author-level access and above, to delete any post on the WordPress site, including posts authored by other users.
Affected versions
max 4.3.1.
Status
vulnerable
Apr 13, 2026

GetGenie – Ai Content Writer with Keyword Research and Competitor Analysis # CVE-2026-2879

CVE, Research URL

CVE-2026-2879

Date
Mar 14, 2026
Research Description
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2. This is due to missing validation on the `id` parameter in the `create()` method of the `GetGenieChat` REST API endpoint. The method accepts a user-controlled post ID and, when a post with that ID exists, calls `wp_update_post()` without verifying that the current user owns the post or that the post is of the expected `getgenie_chat` type. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite arbitrary posts owned by any user — including Administrators — effectively destroying the original content by changing its `post_type` to `getgenie_chat` and reassigning `post_author` to the attacker.
Affected versions
max 4.3.3.
Status
vulnerable

GetGenie – Ai Content Writer with Keyword Research and Competitor Analysis # CVE-2026-2257

CVE, Research URL

CVE-2026-2257

Date
Mar 14, 2026
Research Description
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar.
Affected versions
max 4.3.3.
Status
vulnerable
Feb 27, 2026

GetGenie – Ai Content Writer with Keyword Research and Competitor Analysis # CVE-2026-24356

CVE, Research URL

CVE-2026-24356

Date
Jan 22, 2026
Research Description
Missing Authorization vulnerability in Roxnor GetGenie getgenie allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GetGenie: from n/a through <= 4.3.0.
Affected versions
max 4.3.0.
Status
vulnerable