Description
Missing Authorization vulnerability in monetagwp Monetag Official Plugin monetag-official allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Monetag Official Plugin: from n/a through <= 1.1.3.
Published: 2026-01-23
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access due to Missing Authorization
Action: Apply Patch
AI Analysis

Impact

Missing Authorization in Monetag Official Plugin versions through 1.1.3 allows an attacker to exploit incorrectly configured access control security levels. The vulnerability means that requests can be processed without the required authorization checks, enabling actions that should be restricted. The weakness is classified as CWE‑862: Lack of Security Controls for Unauthorized Access. The CVE score of 5.4 places the risk in a moderate category, indicating that while exploitation is not trivial, the potential impact on confidentiality, integrity or availability is non‑negligible if the plugin is exposed to the public web.

Affected Systems

WordPress sites running the Monetag Official Plugin, branded as monetagwp:Monetag Official Plugin, with affected versions from the initial release up through 1.1.3. No higher‑than‑6‑digit versioning is mentioned, and all releases prior to or equal to 1.1.3 contain the flaw.

Risk and Exploitability

The CVSS score indicates moderate severity, and the EPSS of less than 1% suggests a low probability of existing exploitation, though no reported exploits exist in the KEV catalog. The vulnerability is exploitable by users who can send crafted HTTP requests to any endpoint within the plugin that lacks proper authorization checks. An attacker could gain unauthorized access to the plugin’s administrative interface or any backend actions, potentially reading or modifying data stored by the plugin. As the flaw is in access control logic, it can be leveraged without needing additional privileges or exploiting other vulnerabilities in the environment.

Generated by OpenCVE AI on April 16, 2026 at 01:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Monetag Official Plugin to a version newer than 1.1.3 once it becomes available.
  • If an upgrade cannot be performed immediately, restrict access to the plugin’s administrative URLs by applying role‑based access controls or web‑server authentication such as .htaccess restrictions.
  • Deploy a web application firewall rule that inspects requests to the plugin’s endpoints and blocks unauthenticated or unauthorized traffic.
  • Conduct a security review of the plugin’s endpoints to verify that all actions enforce the necessary authorization checks before execution.

Generated by OpenCVE AI on April 16, 2026 at 01:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in monetagwp Monetag Official Plugin monetag-official allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Monetag Official Plugin: from n/a through <= 1.1.3.
Title WordPress Monetag Official Plugin plugin <= 1.1.3 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:06.240Z

Reserved: 2026-01-23T12:31:51.715Z

Link: CVE-2026-24551

cve-icon Vulnrichment

Updated: 2026-01-26T18:09:49.004Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:11.717

Modified: 2026-04-23T15:36:48.733

Link: CVE-2026-24551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:00:12Z

Weaknesses