Description
Missing Authorization vulnerability in Jahid Hasan Admin login URL Change admin-login-url-change allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Admin login URL Change: from n/a through <= 1.1.5.
Published: 2026-01-23
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access due to missing authorization
Action: Assess and Patch
AI Analysis

Impact

A missing authorization flaw in the Admin login URL Change plugin allows an attacker to bypass standard access controls, enabling operations that should be restricted to privileged users. The vulnerability stems from incorrectly configured access control security levels, meaning ordinary users, or potentially unauthenticated actors, can exploit the plugin’s functionality to gain elevated privileges or manipulate login URLs. This broken access control flaw (CWE‑862) directly threatens the confidentiality, integrity, and availability of the site’s administrative functions.

Affected Systems

WordPress sites that have installed Jahid Hasan’s Admin login URL Change plugin, versions up through 1.1.5. The flaw affects the entire plugin codebase and any WordPress installation that has not upgraded beyond the affected version.

Risk and Exploitability

The CVSS base score of 4.3 places this issue in the moderate severity range, and the EPSS score of less than 1 % indicates a low probability of being actively exploited in the wild. The vulnerability is not listed in CISA’s known‑exploited catalog. The likely attack vector is through the web interface of the plugin, where an attacker can send crafted requests to APIs or endpoints without verifying user roles. The lack of authentication checks enables successful exploitation, yielding unauthorized administrative access on affected sites.

Generated by OpenCVE AI on April 16, 2026 at 07:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Admin login URL Change plugin to any release newer than 1.1.5 to remove the missing authorization flaw.
  • If an upgrade cannot be performed immediately, restrict access to the plugin’s endpoints by limiting them to administrator roles using WordPress’s role‑based access controls, or by adding server‑level restrictions such as .htaccess rules.
  • Disable the plugin entirely if the functionality is not required, and verify that no other components rely on it before doing so.

Generated by OpenCVE AI on April 16, 2026 at 07:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Jahid Hasan Admin login URL Change admin-login-url-change allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Admin login URL Change: from n/a through <= 1.1.5.
Title WordPress Admin login URL Change plugin <= 1.1.5 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:20.604Z

Reserved: 2026-01-23T12:32:02.839Z

Link: CVE-2026-24578

cve-icon Vulnrichment

Updated: 2026-01-26T18:37:43.127Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:15.623

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:30:28Z

Weaknesses