Description
Missing Authorization vulnerability in WP Chill Strong Testimonials strong-testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through <= 3.2.20.
Published: 2026-02-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Immediate Patch
AI Analysis

Impact

A missing authorization check in the WordPress Strong Testimonials plugin allows attackers to bypass intended access controls. The vulnerability, classified as CWE‑862, could enable an attacker with any level of web access to use plugin endpoints that should be restricted. This could let them read, create, edit, or delete testimonials or otherwise manipulate data stored by the plugin, compromising data integrity and confidentiality. Without proper privilege checks, even users with limited permissions might gain full control over the plugin's functions.

Affected Systems

The flaw affects the WP Chill Strong Testimonials WordPress plugin through version 3.2.20 and earlier. All installations that have not upgraded past this version remain vulnerable. The vulnerability is tied to the plugin’s access‑control configuration, so systems running any of these versions without adequate safeguards are at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1 % suggests a low probability of exploitation in the wild, and the issue is not referenced in the CISA Known Exploited Vulnerabilities catalog. The attack vector is not explicitly detailed, but the description implies that exploiting the flaw would involve interacting with the plugin’s administrative interfaces, typically through web requests. While the exact prerequisites are unclear, it is reasonable to infer that some level of authenticated access may be required, or that the vulnerability could be leveraged by a malicious actor who can send crafted requests to the plugin’s endpoints.

Generated by OpenCVE AI on April 16, 2026 at 07:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Strong Testimonials plugin to a version newer than 3.2.20, such as 3.2.21 or later, which removes the missing authorization check.
  • Verify that the plugin’s access‑control settings are correctly configured and that only authorized roles can manage testimonials.
  • If upgrading is not immediately possible, restrict external access to the plugin’s administrative URLs by implementing WordPress role restrictions or a web application firewall rule that blocks unauthenticated or low‑privilege requests to the affected endpoints.

Generated by OpenCVE AI on April 16, 2026 at 07:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpchill
Wpchill strong Testimonials
Vendors & Products Wordpress
Wordpress wordpress
Wpchill
Wpchill strong Testimonials

Tue, 03 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in WP Chill Strong Testimonials strong-testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through <= 3.2.20.
Title WordPress Strong Testimonials plugin <= 3.2.20 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
Wpchill Strong Testimonials
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:34.344Z

Reserved: 2026-01-28T09:50:35.464Z

Link: CVE-2026-24957

cve-icon Vulnrichment

Updated: 2026-02-03T17:08:29.735Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T15:16:16.423

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:15:28Z

Weaknesses