Description
Missing Authorization vulnerability in Hype Hype pico allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hype: from n/a through <= 1.0.5.
Published: 2025-12-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A broken access control flaw in the Hype plugin up to version 1.0.5 permits attackers to bypass intended authorization checks, exposing privileged functionality to users who should be denied access. The weakness is categorized as CWE‑862, which signifies missing authorization logic that can lead to data exposure or improper operation. While the CVSS score indicates moderate severity, the flaw can undermine the integrity of the site’s content and configuration settings.

Affected Systems

Any WordPress site that has the Hype plugin installed with a version of 1.0.5 or earlier is impacted. The vulnerability applies to all installations of the Hype Hype pico module within the specified version range, regardless of other installed plugins or themes.

Risk and Exploitability

The CVSS score of 5.3 reflects medium risk, and the EPSS score of less than 1% suggests low exploitation probability at present. This CVE is not listed in the CISA KEV catalog. The likely attack vector involves an adversary who can reach the plugin’s endpoints, such as a logged‑in user with standard privileges or an unauthenticated user triggering an endpoint that incorrectly bypasses role checks. The precise conditions are not explicitly detailed in the description, so attackers should assume that anyone able to access the plugin’s administrative or AJAX interfaces could exploit the vulnerability. As a result, the flaw can lead to unauthorized configuration changes or access to sensitive content.

Generated by OpenCVE AI on April 30, 2026 at 05:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Hype to the latest version released after 1.0.5; if a newer release is unavailable, contact the vendor for a patch or a specific fix.
  • If upgrading is not immediately possible, deactivate the Hype plugin to eliminate the attack surface until a fix is applied.
  • Audit and enforce proper role‑based access controls on the WordPress site, ensuring that only authorized administrators can reach the plugin’s backend endpoints, and consider restricting access to the problematic URLs via the web server or firewall rules.

Generated by OpenCVE AI on April 30, 2026 at 05:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Hype
Hype hype
Wordpress
Wordpress wordpress
Vendors & Products Hype
Hype hype
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Hype Hype pico allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hype: from n/a through <= 1.0.5.
Title WordPress Hype plugin <= 1.0.5 - Broken Access Control vulnerability
Weaknesses CWE-862
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:02.160Z

Reserved: 2025-06-04T09:42:34.940Z

Link: CVE-2025-49348

cve-icon Vulnrichment

Updated: 2025-12-10T21:54:12.605Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:17:58.387

Modified: 2026-04-27T20:16:11.080

Link: CVE-2025-49348

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses