Description
Missing Authorization vulnerability in wppochipp Pochipp pochipp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pochipp: from n/a through <= 1.18.0.
Published: 2025-12-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a missing authorization flaw that allows an attacker to abuse incorrectly configured access control settings in the WordPress Pochipp plugin. With the absence of proper privilege checks, an attacker could perform actions that should be restricted, such as modifying plugin settings, creating or deleting content, or executing other privileged operations within the site. This directly compromises data integrity and could elevate an attacker’s privileges on the affected WordPress installation.

Affected Systems

The issue affects any WordPress site that has the Pochipp plugin installed and running version 1.18.0 or earlier. It is independent of the WordPress core version and is confined to the plugin’s code base.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests that exploitation is currently considered unlikely. The vulnerability is not listed in CISA’s KEV catalog. The likely attack path would involve an authenticated user or someone with sufficient access to the site’s admin interface triggering plugin endpoints that lack proper authorization checks. Based on the description, it is inferred that any user who can reach the impacted routes could potentially exploit the flaw to carry out privileged actions.

Generated by OpenCVE AI on April 29, 2026 at 12:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Pochipp plugin to version 1.18.1 or later if available.
  • If an upgrade cannot be performed immediately, disable the plugin entirely until a patched version is released.
  • Restrict administrative access to trusted users and ensure that only individuals with legitimate privileges can reach the plugin’s administrative interfaces.

Generated by OpenCVE AI on April 29, 2026 at 12:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Tue, 16 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in wppochipp Pochipp pochipp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pochipp: from n/a through <= 1.18.0.
Title WordPress Pochipp plugin <= 1.18.0 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:09:03.820Z

Reserved: 2025-11-21T11:21:32.202Z

Link: CVE-2025-66129

cve-icon Vulnrichment

Updated: 2025-12-16T17:08:31.669Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T09:15:57.397

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-66129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:30:10Z

Weaknesses