Description
Missing Authorization vulnerability in PopCash PopCash.Net Code Integration Tool popcashnet-code-integration-tool allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PopCash.Net Code Integration Tool: from n/a through <= 1.8.
Published: 2026-01-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Patch Update
AI Analysis

Impact

The vulnerability is a missing authorization flaw that allows attackers to bypass the required checks for protected endpoints in the PopCash.Net Code Integration Tool plugin. This can enable unauthorized users to read, modify, or delete sensitive plugin data and settings, potentially compromising the security posture of the entire WordPress site. The weakness corresponds to CWE-862 (Broken Access Control).

Affected Systems

The issue affects the PopCash.Net Code Integration Tool plugin for WordPress, developed by PopCash. Versions up to and including 1.8 are impacted. Users who have installed any of these versions on their WordPress installations are vulnerable until they upgrade.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, and the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that attackers can gain access by sending crafted HTTP requests to the plugin’s admin URLs, exploiting the lack of proper access checks; the likely attack vector is remote via the public web interface. Therefore, there is a modest but real risk if the plugin remains unpatched and its administrative interfaces are exposed to untrusted users.

Generated by OpenCVE AI on April 16, 2026 at 07:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PopCash.Net Code Integration Tool to a version newer than 1.8
  • If an upgrade is not feasible, restrict the plugin’s administrative URLs to a limited set of IP addresses or enforce strong authentication
  • Audit and enforce correct role-based permissions within WordPress to prevent unauthorized access to plugin features
  • Monitor the site for suspicious activity around the plugin’s endpoints and review logs for unauthorized attempts

Generated by OpenCVE AI on April 16, 2026 at 07:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Popcash
Popcash popcash.net Code Integration Tool
Wordpress
Wordpress wordpress
Vendors & Products Popcash
Popcash popcash.net Code Integration Tool
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in PopCash PopCash.Net Code Integration Tool popcashnet-code-integration-tool allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PopCash.Net Code Integration Tool: from n/a through <= 1.8.
Title WordPress PopCash.Net Code Integration Tool plugin <= 1.8 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Popcash Popcash.net Code Integration Tool
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:50.406Z

Reserved: 2026-01-23T12:32:24.372Z

Link: CVE-2026-24619

cve-icon Vulnrichment

Updated: 2026-01-23T17:50:13.557Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:20.890

Modified: 2026-04-28T15:16:20.033

Link: CVE-2026-24619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:30:28Z

Weaknesses