Description
Missing Authorization vulnerability in Merlot Digital (by TNC) TNC Toolbox: Web Performance tnc-toolbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TNC Toolbox: Web Performance: from n/a through <= 2.0.4.
Published: 2025-11-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Missing Authorization flaw in the TNC Toolbox: Web Performance WordPress plugin that allows an attacker to access administrative functions or data that should be restricted. The plugin’s incorrect access control enforcement means that unauthorized users could manipulate performance settings or view sensitive configuration information. The weakness is identified as CWE-862, indicating a failure to enforce proper access control.

Affected Systems

The flaw affects Merlot Digital (by TNC) TNC Toolbox: Web Performance plugin versions from an unspecified initial release through and including 2.0.4. Users who have installed any of these releases on a WordPress site are at risk. The plugin is part of the WordPress ecosystem, so the vulnerability exists in WordPress sites that have it.

Risk and Exploitability

Based on the description, the likely attack vector is sending crafted requests to the plugin’s administrative interface, potentially using an existing WordPress user account with insufficient privileges that the plugin fails to properly restrict. With a CVSS base score of 4.3 the flaw is considered medium severity. The EPSS score is less than 1 % indicating that exploitation is currently rare or hard to carry out. The vulnerability is not listed in CISA’s KEV catalog and there is no known public exploit. An attacker would likely need to have a WordPress account with sufficient privileges or construct a crafted request that bypasses WordPress’s internal permission checks for the plugin’s administrative interface.

Generated by OpenCVE AI on April 30, 2026 at 05:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the TNC Toolbox: Web Performance plugin to the latest available version that fixes the access control issue.
  • If an update is not possible, remove or deactivate the plugin to eliminate the attack surface.
  • Configure WordPress and the server to restrict all administrative network access to known IP addresses or VPNs, ensuring that only trusted users can reach the plugin’s admin interface.

Generated by OpenCVE AI on April 30, 2026 at 05:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 01 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Merlot Digital (by TNC) TNC Toolbox: Web Performance tnc-toolbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TNC Toolbox: Web Performance: from n/a through <= 2.0.4.
Title WordPress TNC Toolbox: Web Performance plugin <= 2.0.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:17.096Z

Reserved: 2025-11-21T11:21:20.344Z

Link: CVE-2025-66108

cve-icon Vulnrichment

Updated: 2025-12-01T17:53:27.684Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T13:15:52.320

Modified: 2026-04-27T18:16:35.990

Link: CVE-2025-66108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses