Description
Missing Authorization vulnerability in Joovii Sendle Shipping official-sendle-shipping-method allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Sendle Shipping: from n/a through <= 6.02.
Published: 2025-10-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a missing authorization flaw that allows users to access plugin functionality not properly constrained by access control lists. The flaw could enable unauthorized users to invoke shipping‑related actions, potentially exposing sensitive data or performing unauthorized operations. The weakness is classified as CWE‑862 and is reflected in a CVSS score of 5.3. Because the flaw is not known to be actively exploited, the EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog.

Affected Systems

WordPress sites that use the official Sendle Shipping plugin (Joovii Sendle Shipping). All releases from the initial version up to and including version 6.02 are potentially impacted. This includes any site that has the plugin installed in those versions.

Risk and Exploitability

Attackers can exploit the flaw without special credentials, using publicly reachable plugin endpoints. Because the vulnerability requires only standard site access, the risk is moderate, however the very low EPSS score suggests that active exploitation is unlikely at present. The CVSS score of 5.3 indicates a medium severity impact, with potential for confidentiality or integrity compromise if privilege escalation succeeds. No exploitation activity has been reported, and the vulnerability is not yet in the KEV catalog.

Generated by OpenCVE AI on April 29, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Sendle Shipping plugin to the latest version (≥ 6.03) immediately.
  • If an upgrade is not feasible, deactivate the plugin or restrict its use to trusted users only.
  • Review and tighten role‑based permissions for any remaining plugin functions to ensure proper access control enforcement.

Generated by OpenCVE AI on April 29, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Joovii
Joovii sendle Shipping
Wordpress
Wordpress wordpress
Vendors & Products Joovii
Joovii sendle Shipping
Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Joovii Sendle Shipping official-sendle-shipping-method allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Sendle Shipping: from n/a through <= 6.02.
Title WordPress Sendle Shipping plugin <= 6.02 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Joovii Sendle Shipping
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:07.360Z

Reserved: 2025-10-24T14:25:07.970Z

Link: CVE-2025-62976

cve-icon Vulnrichment

Updated: 2025-10-27T14:57:20.759Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:58.283

Modified: 2026-04-27T17:16:39.147

Link: CVE-2025-62976

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T20:30:19Z

Weaknesses