Description
Missing Authorization vulnerability in bestwebsoft Multilanguage by BestWebSoft multilanguage allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Multilanguage by BestWebSoft: from n/a through <= 1.5.2.
Published: 2026-01-23
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Multilanguage plugin
Action: Immediate Patch
AI Analysis

Impact

It is a missing authorization vulnerability that exploits incorrectly configured access control security levels within the Multilanguage by BestWebSoft plugin. The flaw enables a user who should not have permission to modify or view the plugin’s configuration to do so, effectively bypassing the intended role restrictions. The impact is unauthorized access to plugin settings, which could let an attacker alter language mappings or inject content without the site owner’s knowledge.

Affected Systems

The affected product is the WordPress plugin Multilanguage by BestWebSoft, specifically versions from the earliest releases through 1.5.2. WordPress sites that have not updated this plugin are at risk. The vulnerability is version‑agnostic within that range and does not depend on the underlying operating system or hosting environment.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, and the EPSS score is less than 1%, suggesting a very low likelihood of exploitation in the wild. The vendor has not listed this vulnerability in the CISA KEV catalog. Attackers would need access to a WordPress user account with limited permissions or the ability to create such accounts, and then exploit the misconfigured ACL to reach the plugin settings. The absence of a known exploit and the low EPSS reduce immediate risk, but the potential for content manipulation warrants prompt remediation.

Generated by OpenCVE AI on April 16, 2026 at 01:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Multilanguage by BestWebSoft plugin to version 1.5.3 or newer.
  • Restrict the plugin’s administrative capabilities to users with the Administrator role, or remove lower‑privilege roles that have been granted access.
  • Review the WordPress user roles and permissions to ensure no unnecessary privileges are granted, and consider installing a role‑management plugin to enforce least privilege.

Generated by OpenCVE AI on April 16, 2026 at 01:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Bestwebsoft
Bestwebsoft multilanguage
Wordpress
Wordpress wordpress
Vendors & Products Bestwebsoft
Bestwebsoft multilanguage
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in bestwebsoft Multilanguage by BestWebSoft multilanguage allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Multilanguage by BestWebSoft: from n/a through <= 1.5.2.
Title WordPress Multilanguage by BestWebSoft plugin <= 1.5.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Bestwebsoft Multilanguage
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:50.338Z

Reserved: 2026-01-23T12:32:12.343Z

Link: CVE-2026-24598

cve-icon Vulnrichment

Updated: 2026-01-23T20:43:05.535Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:17.953

Modified: 2026-04-28T15:16:18.097

Link: CVE-2026-24598

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:45:20Z

Weaknesses