Impact
The issue is an authorization bypass through a user‑controlled key that allows an attacker to perform insecure direct object references (IDOR). It can enable unauthorized reading, modification, or deletion of data or resources that the user should not have access to, thereby compromising confidentiality and integrity of the site data. The flaw is a classic case of CWE‑639, where improper access control lets a user retrieve objects for which they lack permission.
Affected Systems
The vulnerability affects the FiveStar WordPress theme provided by Mikado‑Themes, versions up to and including 1.7. The theme is commonly used as a frontend display template and is active on any WordPress installation that installs it.
Risk and Exploitability
The CVSS score is 5.4, indicating a moderate severity vulnerability. The EPSS score is below 1%, so the probability that it is currently being exploited is low, and the vulnerability has not been listed in the CISA KEV catalog. The likely attack path is via authenticated or unauthenticated web requests that reference internal objects or resources that the theme exposes. An attacker would need to supply a key or identifier that maps to protected data, and if the access control is not enforced correctly, the request would succeed.
OpenCVE Enrichment