Description
Missing Authorization vulnerability in iNET iNET Webkit inet-webkit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iNET Webkit: from n/a through <= 1.2.4.
Published: 2026-01-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Broken Access Control
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an authorization bypass in the iNET Webkit WordPress plugin, allowing attackers to gain access to resources they should not see or control. The weakness arises from improper validation of user permissions, categorized as CWE-862. Consequently, an attacker could read or modify sensitive data, alter plugin settings, and potentially inject malicious content into the WordPress site. The impact threatens confidentiality and integrity of site data, and could provide a foothold for further exploitation.

Affected Systems

WordPress installations that use the iNET Webkit plugin, versions up to and including 1.2.4. All deployments of this plugin are considered vulnerable, irrespective of site size or user configuration.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity risk, while the EPSS score of under 1% denotes a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers are likely to exploit the flaw over HTTP by sending requests to plugin endpoints that lack proper role checks; the likely attack vector is inferred from the description. No additional prerequisites beyond legitimate WordPress credentials are explicitly listed, making the condition relatively easy to satisfy for any authenticated user.

Generated by OpenCVE AI on April 16, 2026 at 07:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the iNET Webkit plugin to a version newer than 1.2.4.
  • Restrict the plugin’s admin‑level features to roles that truly require them and review role assignments in WordPress.
  • Remove or disable any inactive plugin modules that expose privileged functionality to reduce attack surface.

Generated by OpenCVE AI on April 16, 2026 at 07:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Inet
Inet inet Webkit
Wordpress
Wordpress wordpress
Vendors & Products Inet
Inet inet Webkit
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in iNET iNET Webkit inet-webkit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iNET Webkit: from n/a through <= 1.2.4.
Title WordPress iNET Webkit plugin <= 1.2.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Inet Inet Webkit
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:18.604Z

Reserved: 2026-01-23T12:31:58.117Z

Link: CVE-2026-24566

cve-icon Vulnrichment

Updated: 2026-01-26T21:12:35.308Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:14.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:30:28Z

Weaknesses