Description
Authorization Bypass Through User-Controlled Key vulnerability in Shiprocket Shiprocket shiprocket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Shiprocket: from n/a through <= 2.0.8.
Published: 2026-02-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass leading to unauthorized data access
Action: Apply Patch
AI Analysis

Impact

The Shiprocket plugin for WordPress contains an Insecure Direct Object Reference (IDOR) flaw that allows an attacker to craft requests with incorrect user-controlled keys, thereby bypassing authorization checks and accessing data or functionalities reserved for other users. This vulnerability stems from improperly configured access control levels and can result in the disclosure or manipulation of confidential information. The weakness is classified as CWE‑639, indicating a flaw where authorization is granted based on user-supplied input rather than legitimate checks.

Affected Systems

Shiprocket Shiprocket for WordPress has been affected in all releases from the initial release through version 2.0.8. Users running any of these versions are vulnerable until they upgrade.

Risk and Exploitability

With a CVSS score of 7.5, the vulnerability is considered high severity. The EPSS score is less than 1%, meaning the likelihood of exploitation at the time of this analysis is low, and it is not listed in CISA's KEV catalog. The likely attack path involves sending crafted HTTP requests that reference object identifiers, and the flaw can be exploited even without authentication if an attacker is able to guess or craft the correct key values. While the exploitation probability remains modest, organizations should treat the issue as a serious authorization problem that could lead to data exposure.

Generated by OpenCVE AI on April 28, 2026 at 09:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Shiprocket to version 2.0.9 or later to receive the fix for the IDOR flaw.
  • If an immediate upgrade is not possible, block access to the vulnerable endpoints via web application firewall rules or access control lists.
  • Review and audit access control configurations to ensure no additional exposed object references remain.

Generated by OpenCVE AI on April 28, 2026 at 09:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Shiprocket
Shiprocket shiprocket
Wordpress
Wordpress wordpress
Vendors & Products Shiprocket
Shiprocket shiprocket
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Shiprocket Shiprocket shiprocket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Shiprocket: from n/a through <= 2.0.8.
Title WordPress Shiprocket plugin <= 2.0.8 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Shiprocket Shiprocket
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:27.678Z

Reserved: 2025-12-15T10:01:11.953Z

Link: CVE-2025-68051

cve-icon Vulnrichment

Updated: 2026-02-25T18:52:18.249Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:09.003

Modified: 2026-04-27T19:16:23.313

Link: CVE-2025-68051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T09:45:28Z

Weaknesses