Description
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Cocco cocco allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cocco: from n/a through <= 1.5.1.
Published: 2026-01-22
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass via IDOR
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an authorization bypass through user‑controlled keys in the Mikado‑Themes Cocco theme. It permits attackers to manipulate request parameters and access or modify resources that should otherwise be restricted, compromising the confidentiality and integrity of content managed by the theme. The weakness is categorized as CWE‑639, indicating a problem with access control validation.

Affected Systems

The issue affects Mikado‑Themes Cocco theme version 1.5.1 and earlier, as sold for WordPress. Any WordPress site that has installed the theme within that version range is potentially exposed, regardless of the site's hosting environment. Versions newer than 1.5.1 are considered unaffected if the vendor’s patch correctly addresses the IDOR flaw.

Risk and Exploitability

The CVSS score of 5.4 denotes moderate severity, while the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, indicating it has not yet been widely exploited. Nevertheless, the IDOR can be triggered by crafting URLs or API calls that reference protected objects. An attacker who can guess or modify identifiers could read or overwrite data, potentially enabling content tampering or unauthorized disclosure. The threat level is particularly relevant for sites that rely heavily on the theme for critical content management.

Generated by OpenCVE AI on April 16, 2026 at 07:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Cocco theme to the latest available version that fixes the IDOR issue, ideally version 1.5.2 or newer from Mikado‑Themes.
  • If an upgrade is not immediately possible, remove the theme from active use or restrict access to the relevant resources, such as disabling direct object URL access or implementing additional access controls.
  • Audit the theme’s configuration to ensure that user‑supplied keys are properly validated and that permission checks align with the intended access level for each resource.

Generated by OpenCVE AI on April 16, 2026 at 07:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Tue, 27 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes cocco
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes cocco
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Cocco cocco allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cocco: from n/a through <= 1.5.1.
Title WordPress Cocco theme <= 1.5.1 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Mikado-themes Cocco
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:54:29.740Z

Reserved: 2026-01-07T12:21:40.879Z

Link: CVE-2026-22391

cve-icon Vulnrichment

Updated: 2026-01-27T18:38:28.724Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:32.713

Modified: 2026-04-28T19:36:33.850

Link: CVE-2026-22391

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:00:11Z

Weaknesses