Description
Incorrect Privilege Assignment vulnerability in e-plugins Institutions Directory institutions-directory allows Privilege Escalation.This issue affects Institutions Directory: from n/a through <= 1.3.4.
Published: 2026-01-22
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an incorrect privilege assignment in the Institutions Directory plugin that allows a lower‑privileged user to gain higher privileges within a WordPress site. This flaw is a CWE‑266 weakness and can lead to unauthorized access to site configuration, content, or sensitive data. Because the plugin runs with normal WordPress permissions, an attacker could use the bug to elevate privileges and potentially take full control of the site.

Affected Systems

The flaw is present in the e‑plugins Institutions Directory plugin versions 1.3.4 and earlier. The plugin is distributed for WordPress sites and does not provide any version distinction beyond the 1.3.4 release. Therefore any WordPress installation using a version of the plugin at or below 1.3.4 is affected.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity and the EPSS score of less than 1 % suggests low current exploitation probability, although the vulnerability is not listed in the CISA KEV catalog. The attack vector is likely authenticated, requiring the attacker to have the ability to enroll as a normal user or have some form of authenticated session. An attacker who exploits the bug may be able to grant themselves or another account higher capabilities, giving them broader access to the WordPress back‑end. Because the flaw is local to the plugin, a direct exploit would typically require that the attacker can execute code within the plugin environment, for example by uploading or modifying plugin files, or by leveraging a separate authentication exploit.

Generated by OpenCVE AI on April 29, 2026 at 10:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Institutions Directory plugin to the latest published version that addresses the privilege assignment bug. Any release newer than 1.3.4 should be used.
  • After upgrading, audit the site’s user role assignments and remove any privileges that are no longer necessary, ensuring only administrators retain full access.
  • If an immediate upgrade is not feasible, disable the plugin or restrict its functionality to a single user role that does not have privileges required for the vulnerability, and monitor user activity logs for privilege changes.

Generated by OpenCVE AI on April 29, 2026 at 10:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared E-plugins
E-plugins institutions Directory
Wordpress
Wordpress wordpress
Vendors & Products E-plugins
E-plugins institutions Directory
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Incorrect Privilege Assignment vulnerability in e-plugins Institutions Directory institutions-directory allows Privilege Escalation.This issue affects Institutions Directory: from n/a through <= 1.3.4.
Title WordPress Institutions Directory plugin <= 1.3.4 - Privilege Escalation vulnerability
Weaknesses CWE-266
References

Subscriptions

E-plugins Institutions Directory
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:43:30.662Z

Reserved: 2025-12-29T11:20:07.744Z

Link: CVE-2025-69182

cve-icon Vulnrichment

Updated: 2026-01-27T21:48:49.701Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:24.680

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-69182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:30:08Z

Weaknesses