Description
Missing Authorization vulnerability in FolioVision FV Thoughtful Comments thoughtful-comments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FV Thoughtful Comments: from n/a through <= 0.3.5.
Published: 2025-01-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a missing authorization flaw that allows an attacker to invoke plugin operations without proper permission. The flaw stems from incorrectly configured access control security levels, enabling manipulation or retrieval of comment data. This weakness aligns with CWE‑862, signifying that the plugin fails to enforce required access checks.

Affected Systems

The affected software is FolioVision FV Thoughtful Comments, with all releases up to and including version 0.3.5. WordPress sites that have installed any of these versions are at risk if the plugin’s access controls are not overridden elsewhere by site configuration.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate impact severity. EPSS suggests a very low but nonzero probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote via the WordPress web interface, where an unauthenticated or low‑privilege user could submit requests to the plugin’s endpoints and gain elevated capabilities. Exploitation requires the plugin to be active and exposed, but no additional software or network configuration is mandated by the description.

Generated by OpenCVE AI on May 1, 2026 at 18:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the FV Thoughtful Comments plugin to the latest available version (0.3.6 or newer).
  • Disable or remove the plugin if it is not required for site functionality.
  • Enforce proper role‑based permissions in WordPress so that only trusted user roles can invoke the plugin’s sensitive operations.

Generated by OpenCVE AI on May 1, 2026 at 18:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3817 Missing Authorization vulnerability in Foliovision FV Thoughtful Comments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FV Thoughtful Comments: from n/a through 0.3.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Foliovision FV Thoughtful Comments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FV Thoughtful Comments: from n/a through 0.3.5. Missing Authorization vulnerability in FolioVision FV Thoughtful Comments thoughtful-comments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FV Thoughtful Comments: from n/a through <= 0.3.5.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Fri, 24 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Foliovision FV Thoughtful Comments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FV Thoughtful Comments: from n/a through 0.3.5.
Title WordPress FV Thoughtful Comments plugin <= 0.3.5 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:30.096Z

Reserved: 2025-01-23T14:51:18.435Z

Link: CVE-2025-24613

cve-icon Vulnrichment

Updated: 2025-01-24T18:46:59.395Z

cve-icon NVD

Status : Deferred

Published: 2025-01-24T18:15:37.277

Modified: 2026-04-23T15:25:07.847

Link: CVE-2025-24613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T19:00:08Z

Weaknesses