Description
Missing Authorization vulnerability in e-plugins Hospital Doctor Directory hospital-doctor-directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hospital Doctor Directory: from n/a through <= 1.3.9.
Published: 2026-01-22
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Hospital Doctor Directory plugin contains a missing authorization flaw that lets attackers bypass intended access restrictions on the plugin’s administrative and data‑exposure features. As a result, an attacker could read, modify, or delete sensitive information stored by the plugin, or potentially execute actions reserved for higher‑privileged users. The weakness is characterized as CWE-862 and is labeled a high‑severity vulnerability.

Affected Systems

All installations of the e‑plugins Hospital Doctor Directory plugin up to and including version 1.3.9 are impacted. The issue exists in every release from the initial version through 1.3.9, so any site running the plugin in this range is vulnerable.

Risk and Exploitability

The CVSS score of 7.3 indicates a high impact, while the EPSS score of less than 1 % suggests the likelihood of exploitation is low at present. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker would likely exploit the flaw via the plugin’s web interface, potentially by accessing unauthorized endpoints after authenticating as a user with limited privileges. Precise exploitation requires correctly configured access controls within the plugin, so the attack vector may be either authenticated or unauthenticated, depending on the site’s configuration.

Generated by OpenCVE AI on April 29, 2026 at 10:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Hospital Doctor Directory plugin to the latest version (1.4.0 or newer) as soon as possible.
  • Ensure that only users with appropriate administrative roles can access the plugin’s configuration and data pages.
  • If an update is not available immediately, deactivate the plugin until a patch is released to eliminate the risk.

Generated by OpenCVE AI on April 29, 2026 at 10:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared E-plugins
E-plugins hospital & Doctor Directory
Wordpress
Wordpress wordpress
Vendors & Products E-plugins
E-plugins hospital & Doctor Directory
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in e-plugins Hospital Doctor Directory hospital-doctor-directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hospital Doctor Directory: from n/a through <= 1.3.9.
Title WordPress Hospital Doctor Directory plugin <= 1.3.9 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

E-plugins Hospital & Doctor Directory
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:44:12.143Z

Reserved: 2025-12-29T11:20:13.815Z

Link: CVE-2025-69186

cve-icon Vulnrichment

Updated: 2026-01-27T17:49:21.465Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:25.250

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-69186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:45:09Z

Weaknesses