Description
Authorization Bypass Through User-Controlled Key vulnerability in XLPlugins NextMove Lite woo-thank-you-page-nextmove-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects NextMove Lite: from n/a through <= 2.23.0.
Published: 2026-01-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Object Access
Action: Apply Patch
AI Analysis

Impact

The NextMove Lite WordPress plugin suffers from an Insecure Direct Object Reference flaw that allows an attacker to manipulate the user-controlled key used in accessing plugin resources. By altering request parameters, an unauthorized individual may access, view, or modify data intended only for privileged users. The weakness stems from improper validation of authorization checks, classified as CWE-639. The vulnerability can lead to unauthorized information disclosure or modification of the thank‑you page content and related settings, compromising the integrity of the site’s checkout flow.

Affected Systems

Vendors impacted include XLPlugins, specifically the NextMove Lite woo‑thank‑you‑page‑nextmove‑lite plugin for all versions up to and including 2.23.0. Any WordPress installation using this plugin within that version range may be susceptible. No specific stripping of affected sub‑versions is provided, so the entire range from the first release to 2.23.0 is considered at risk.

Risk and Exploitability

The CVSS base score of 5.3 indicates a moderate severity, while the EPSS probability is below 1 %, showing a low likelihood of exploitation in the near term. The flaw is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited, but that does not mitigate the potential impact. An attacker would need network or application access to launch the exploit, and if successful, could bypass normal authorization controls in the plugin. Because the vulnerability is tied to user‑controlled keys, it can be exercised by anyone with knowledge of the key structure, potentially in a public or low‑privilege user context.

Generated by OpenCVE AI on April 16, 2026 at 01:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NextMove Lite to a version higher than 2.23.0 where the IDOR fix is applied.
  • Review and tighten the plugin’s role and capability settings, ensuring that only administrators or appropriately privileged users can access and modify thank‑you page data.
  • Verify that WordPress user roles have not been granted unnecessary capabilities such as "Edit other user’s data," and remove any custom user‑controlled keys that bypass standard access checks.

Generated by OpenCVE AI on April 16, 2026 at 01:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Xlplugins
Xlplugins nextmove
Vendors & Products Wordpress
Wordpress wordpress
Xlplugins
Xlplugins nextmove

Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in XLPlugins NextMove Lite woo-thank-you-page-nextmove-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects NextMove Lite: from n/a through <= 2.23.0.
Title WordPress NextMove Lite plugin <= 2.23.0 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Wordpress Wordpress
Xlplugins Nextmove
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:50.164Z

Reserved: 2026-01-23T12:32:12.343Z

Link: CVE-2026-24599

cve-icon Vulnrichment

Updated: 2026-01-23T20:37:47.261Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:18.110

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:45:20Z

Weaknesses