Description
Missing Authorization vulnerability in G5Theme Zorka zorka allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zorka: from n/a through <= 1.5.7.
Published: 2026-01-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Patch
AI Analysis

Impact

This vulnerability is a missing authorization flaw that permits an attacker to exploit incorrectly configured access control security levels. The weakness allows unauthorized users to access functionality that should be restricted to privileged accounts, potentially resulting in unauthorized data disclosure or modification. It is classified as CWE-862, which indicates session or user authentication failures.

Affected Systems

The issue affects the G5Theme Zorka WordPress theme in all versions through 1.5.7. WordPress sites that have the Zorka theme installed and do not upgrade past this version are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% reflects a very low probability of exploitation as of now. The vulnerability is not listed in the CISA KEV catalog. Based on the nature of the flaw and the fact that it is a web‑based plugin, the likely attack vector is remote, where an attacker can issue HTTP requests to URLs that are incorrectly protected by the theme’s access controls. No additional prerequisites are stated in the description, so any user who can reach the affected theme’s endpoints could potentially exploit the flaw.

Generated by OpenCVE AI on April 18, 2026 at 07:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Zorka theme to the first available version that exceeds 1.5.7, or install a patch provided by G5Theme once it is released.
  • If an update is not possible, disable or restrict access to the theme’s privileged endpoints or functionalities through configuration changes or by removing the theme entirely.
  • Deploy a web application firewall rule to block requests to URLs that should only be accessible by administrators, thereby preventing unauthorized exploitation of the missing authorization flaw.
  • Maintain the latest WordPress core, plugins, and themes to reduce the attack surface for similar vulnerabilities.

Generated by OpenCVE AI on April 18, 2026 at 07:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 12 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in G5Theme Zorka zorka allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zorka: from n/a through <= 1.5.7.
Title WordPress Zorka theme <= 1.5.7 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T17:24:16.799Z

Reserved: 2026-01-07T17:39:30.398Z

Link: CVE-2026-0676

cve-icon Vulnrichment

Updated: 2026-01-12T18:31:29.734Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T10:15:55.170

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:00:05Z

Weaknesses