Description
Missing Authorization vulnerability in emarket-design Request a Quote request-a-quote allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Request a Quote: from n/a through <= 2.5.3.
Published: 2025-12-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a missing authorization flaw in the WordPress Request a Quote plugin. It allows an attacker who can trigger the plugin’s request‑quote functionality to bypass the intended restricted access and harness capabilities normally reserved for authenticated administrators. The weakness corresponds to CWE‑862, where access control enforcement fails, enabling the elevation of privileges within the plugin’s domain.

Affected Systems

The affected product is the emarket‑design Request a Quote WordPress plugin, versions from the earliest available up to and including 2.5.3. No specific minor revision details are listed, so any installation matching or older than 2.5.3 may be vulnerable.

Risk and Exploitability

The CVSS score of 4.3 places the issue in the medium severity range. With an EPSS score of less than 1%, the probability that attackers have already mounted this attack is very low, and the vendor does not list it in the CISA KEV catalog. The likely attack vector requires the attacker to interact with the plugin’s request‑quote endpoint, which could be exposed to both authenticated and unauthenticated users depending on site configuration. Because the flaw permits unauthorized use of privileged functions, it could lead to information disclosure or unapproved actions within the WordPress site if exploited.

Generated by OpenCVE AI on April 29, 2026 at 12:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Request a Quote plugin to the latest version that resolves the access‑control issue
  • Configure WordPress to load the plugin only for authenticated administrator sessions
  • Restrict file permissions on the plugin’s directory so that only the site owner can modify it
  • If the plugin is not required, disable or uninstall it as a temporary workaround

Generated by OpenCVE AI on April 29, 2026 at 12:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 17 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress
Vendors & Products Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in emarket-design Request a Quote request-a-quote allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Request a Quote: from n/a through <= 2.5.3.
Title WordPress Request a Quote plugin <= 2.5.3 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Emarketdesign Request A Quote
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:27:28.119Z

Reserved: 2025-10-29T03:08:17.827Z

Link: CVE-2025-64248

cve-icon Vulnrichment

Updated: 2025-12-17T21:33:31.661Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T09:15:54.560

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-64248

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:30:10Z

Weaknesses