Description
Missing Authorization vulnerability in Dejan Jasnic Trusty Whistleblowing trusty-whistleblowing-solution allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Trusty Whistleblowing: from n/a through <= 2.0.1.
Published: 2025-06-27
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Trusty Whistleblowing plugin contains a missing authorization flaw that allows attackers to bypass the intended access controls and perform unauthorized reading and editing of whistleblowing data. The vulnerability is described as an incorrect configuration of security levels. While the advisory does not specify whether the flaw can be exploited by unauthenticated or only authenticated users, it indicates that the plugin’s endpoints can be accessed in a way that permits unauthorized data access. In a trusted environment, unauthorized modification or exposure of whistleblower information could undermine the platform’s confidentiality and integrity guarantees.

Affected Systems

WordPress sites installing the Trusty Whistleblowing plugin prior to version 2.0.2 are affected. Versions from the earliest release through 2.0.1 are vulnerable. Site administrators should check the plugin version under the WordPress plugins page.

Risk and Exploitability

The CVSS score of 8.2 signals a high severity, while the EPSS score below 1% indicates a low current likelihood of exploitation. The vulnerability is not listed in CISA KEV. According to the advisory, an attacker would likely need to trigger the plugin’s endpoints, which may involve sending crafted requests. The precise authentication requirements are not detailed, so it is unclear whether the flaw can be exploited by unauthenticated users. Prompt remediation or disabling the plugin is the recommended defense.

Generated by OpenCVE AI on April 30, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Trusty Whistleblowing plugin to version 2.0.2 or later
  • Disable or remove the plugin if the whistleblowing functionality is not required
  • Restrict access to the plugin's endpoints to authorized users only

Generated by OpenCVE AI on April 30, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19312 Missing Authorization vulnerability in Dejan Jasnic Trusty Whistleblowing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Trusty Whistleblowing: from n/a through 1.5.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Dejan Jasnic Trusty Whistleblowing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Trusty Whistleblowing: from n/a through 1.5.2. Missing Authorization vulnerability in Dejan Jasnic Trusty Whistleblowing trusty-whistleblowing-solution allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Trusty Whistleblowing: from n/a through <= 2.0.1.
Title WordPress Trusty Whistleblowing plugin <= 1.5.2 - Broken Access Control Vulnerability WordPress Trusty Whistleblowing plugin <= 2.0.1 - Broken Access Control vulnerability
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Fri, 27 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Dejan Jasnic Trusty Whistleblowing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Trusty Whistleblowing: from n/a through 1.5.2.
Title WordPress Trusty Whistleblowing plugin <= 1.5.2 - Broken Access Control Vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:19.632Z

Reserved: 2025-06-19T10:03:43.798Z

Link: CVE-2025-52818

cve-icon Vulnrichment

Updated: 2025-06-27T13:14:05.545Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T12:15:43.993

Modified: 2026-04-23T15:32:13.920

Link: CVE-2025-52818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T17:30:26Z

Weaknesses