Description
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Dolcino dolcino allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Dolcino: from n/a through <= 1.6.
Published: 2026-01-22
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an Authorization Bypass Through User‑Controlled Key, enabling attackers to perform insecure direct object references within the Mikado‑Themes Dolcino WordPress theme. It allows a malicious user to access, modify, or delete data or functionality intended for higher‑privileged users, posing significant privacy and integrity risks. The weakness is classified as CWE‑639.

Affected Systems

Mikado‑Themes Dolcino theme for WordPress, all releases from any pre‑1.6 version up through 1.6, inclusive of 1.6.

Risk and Exploitability

The CVSS rating of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely need to craft a web request that includes a user‑controlled key or parameter to bypass access controls, exploiting the theme’s improperly configured permissions. Given its moderate impact and low exploitation likelihood, it remains important to patch promptly to prevent potential privilege escalation scenarios.

Generated by OpenCVE AI on April 16, 2026 at 07:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Dolcino theme to the latest available version, which removes the IDOR flaw.
  • Re‑review user role definitions and capability checks for theme‑specific features to enforce proper authorization.
  • Implement logging or monitoring of theme‑related access to detect unauthorized attempts and audit changes.

Generated by OpenCVE AI on April 16, 2026 at 07:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}


Tue, 27 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes dolcino
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes dolcino
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Dolcino dolcino allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Dolcino: from n/a through <= 1.6.
Title WordPress Dolcino theme <= 1.6 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Mikado-themes Dolcino
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T17:06:59.157Z

Reserved: 2026-01-07T12:21:56.449Z

Link: CVE-2026-22411

cve-icon Vulnrichment

Updated: 2026-01-27T18:35:57.610Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:34.037

Modified: 2026-04-28T19:36:35.537

Link: CVE-2026-22411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:00:11Z

Weaknesses