Description
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Rosebud rosebud allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rosebud: from n/a through <= 1.4.
Published: 2026-01-23
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Patch Immediately
AI Analysis

Impact

The Rosebud WordPress theme contains an Insecure Direct Object Reference flaw that allows attackers to supply a user‑controlled key to bypass proper authorization checks. This leads to unauthorized viewing or manipulation of protected content or settings within the theme. The vulnerability is identified as CWE‑639, indicating that improper access control underlies the issue.

Affected Systems

The vulnerability affects all installations of Mikado‑Themes Rosebud up to and including version 1.4. Sites running any of these versions are vulnerable unless the theme has been upgraded to a later release that addresses the flaw.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% signifies a very low historical probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog, suggesting it has not been observed in large‑scale attacks. Based on the description, it is inferred that the likely attack vector is direct manipulation of URL or API parameters that expose object identifiers, a classic IDOR attack. Given the low exploitation likelihood and lack of public exploits, the risk remains moderate but mitigable by timely patching.

Generated by OpenCVE AI on April 16, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Rosebud theme to a version newer than 1.4 that fixes the IDOR flaw.
  • If an upgrade is not immediately possible, restrict direct access to theme configuration and protected pages by limiting permissions to administrators or by disabling public visibility of sensitive content.
  • Add server‑side authorization checks to ensure the current user is permitted to access the requested resource before it is served, addressing the improper access control identified by CWE‑639.
  • Validate or block any GET/POST parameters that expose object identifiers to prevent tampering by non‑privileged users.

Generated by OpenCVE AI on April 16, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mikado-themes
Mikado-themes rosebud
Wordpress
Wordpress wordpress
Vendors & Products Mikado-themes
Mikado-themes rosebud
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Rosebud rosebud allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rosebud: from n/a through <= 1.4.
Title WordPress Rosebud theme <= 1.4 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Mikado-themes Rosebud
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:50.698Z

Reserved: 2026-01-23T12:32:36.810Z

Link: CVE-2026-24631

cve-icon Vulnrichment

Updated: 2026-01-23T17:01:54.879Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:22.530

Modified: 2026-04-28T15:16:21.267

Link: CVE-2026-24631

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:30:28Z

Weaknesses