Description
Missing Authorization vulnerability in wpstream WpStream wpstream allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WpStream: from n/a through <= 4.9.5.
Published: 2025-12-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a missing authorization flaw that enables users to circumvent role‑based access restrictions within the WordPress WpStream plugin. An attacker who can trigger the affected function may view or modify content that should be restricted, leading to unauthorized disclosure or tampering of protected data. The core weakness is an Authorization error, classified as CWE‑862.

Affected Systems

WordPress sites running the WpStream plugin, versions up to and including 4.9.5, are impacted. The vulnerability applies to all users of any role if the plugin’s access controls are not correctly configured within the site’s WordPress installation.

Risk and Exploitability

The CVSS score of 5.3 situates this issue in the moderate severity range, suggesting potential for meaningful impact if exploited. The EPSS score is reported as less than 1%, indicating a low likelihood of exploitation in the near term, yet there is no known public exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is via web interface interactions—an adversary may submit crafted requests or manipulate the plugin interface while logged in with any WordPress role, thereby gaining elevated privileges. The fault manifests only if the plugin’s security levels are misconfigured, implying that sites with default or improperly set permissions are at greatest risk.

Generated by OpenCVE AI on April 29, 2026 at 15:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WpStream to the latest version that addresses the access control issue (at least 4.9.6).
  • Verify that the plugin’s role‑based permissions are correctly configured and that only authorized user roles can access sensitive functions.
  • If the plugin is not required, remove or deactivate it entirely.

Generated by OpenCVE AI on April 29, 2026 at 15:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpstream
Wpstream wpstream
Vendors & Products Wordpress
Wordpress wordpress
Wpstream
Wpstream wpstream

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 12:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in wpstream WpStream wpstream allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WpStream: from n/a through <= 4.9.5.
Title WordPress WpStream plugin <= 4.9.5 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
Wpstream Wpstream
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:29.184Z

Reserved: 2025-12-19T10:16:57.339Z

Link: CVE-2025-68521

cve-icon Vulnrichment

Updated: 2025-12-24T19:09:49.372Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:21.637

Modified: 2026-04-27T19:16:27.637

Link: CVE-2025-68521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T15:45:14Z

Weaknesses