Description
The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_global_settings' function in all versions up to, and including, 3.5.09. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary plugin settings.
Published: 2026-03-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of plugin settings by any authenticated user with Subscriber-level access or higher, potentially altering dashboard and theme configurations
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates from a missing capability check in the 'uip_save_global_settings' function of the UiPress lite WordPress plugin, enabling any authenticated user with Subscriber or higher privileges to change the plugin’s configuration. This can alter custom dashboards, admin themes, and page settings without the user’s consent. The flaw does not directly expose system files or execute code, but it compromises the integrity of the admin interface and can lead to unintended UI behavior or indirect exposure through settings that influence front- or back-end functionality.

Affected Systems

All installations of the UiPress lite WordPress plugin up to and including version 3.5.09 are vulnerable. The flaw applies to every WordPress site that has the plugin installed and for which users can log in with Subscriber or higher roles.

Risk and Exploitability

The CVSS base score of 4.3 indicates moderate risk. EPSS data are unavailable, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is authenticated; an attacker must have a valid WordPress account with Subscriber-level rights or higher. Exploitation requires only the ability to submit a settings change, so while the technical barrier is low, the impact is confined to altering plugin configurations rather than providing remote code execution or privilege escalation. Nonetheless, sites should treat the flaw as a significant integrity concern and promptly remediate it.

Generated by OpenCVE AI on March 21, 2026 at 06:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the UiPress lite plugin to any version newer than 3.5.09, which removes the missing capability check.

Generated by OpenCVE AI on March 21, 2026 at 06:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Admintwentytwenty
Admintwentytwenty uipress Lite | Effortless Custom Dashboards, Admin Themes And Pages
Wordpress
Wordpress wordpress
Vendors & Products Admintwentytwenty
Admintwentytwenty uipress Lite | Effortless Custom Dashboards, Admin Themes And Pages
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_global_settings' function in all versions up to, and including, 3.5.09. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary plugin settings.
Title UiPress lite | Effortless custom dashboards, admin themes and pages <= 3.5.09 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings Update
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Admintwentytwenty Uipress Lite | Effortless Custom Dashboards, Admin Themes And Pages
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:41.106Z

Reserved: 2026-02-10T16:06:55.282Z

Link: CVE-2026-2294

cve-icon Vulnrichment

Updated: 2026-03-23T17:13:18.962Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T04:16:58.360

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-2294

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:08Z

Weaknesses