Description
Missing Authorization vulnerability in PublishPress PublishPress Authors publishpress-authors allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PublishPress Authors: from n/a through <= 4.10.1.
Published: 2026-02-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Update
AI Analysis

Impact

The vulnerability is a missing authorization flaw in the PublishPress Authors WordPress plugin. If access controls are misconfigured, an attacker can exploit the plugin to perform actions normally restricted to privileged users. This flaw is described as "Incorrectly Configured Access Control Security Levels." The weakness maps to CWE-862, indicating a problem with improper authorization checks. No remote code execution or denial of service is described, so the primary risk is the ability to elevate privileges and alter content or settings within the WordPress site.

Affected Systems

The affected system is the PublishPress Authors WordPress plugin for all versions up to and including 4.10.1. This vulnerability is present in every build of the plugin from the earliest release through 4.10.1. Users running this plugin on a WordPress site are potentially impacted unless they have already upgraded to a newer, fixed release.

Risk and Exploitability

The severity score is 4.3, which falls in the low range on the CVSS scale, and the Exploit Prediction Scoring System score is lower than one percent, indicating a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. According to the description, exploitation requires that the attacker can leverage the WordPress site’s role‑based access to find a user with elevated privileges configured to use the plugin. The exact attack vector is not explicitly stated, but it is inferred to involve authenticated interactions with the plugin’s administrative interface. If the site administrators have assigned authors or editors roles that can use this plugin, an attacker who can obtain or impersonate such a role could exploit this flaw to tamper with content, users, or other sensitive plugin settings.

Generated by OpenCVE AI on April 16, 2026 at 00:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the PublishPress Authors plugin to a version newer than 4.10.1.
  • Review and tighten WordPress role permissions to ensure only trusted users can use the plugin’s administrative features.
  • Sanitize and validate any plugin configuration values to prevent unauthorized configuration changes.

Generated by OpenCVE AI on April 16, 2026 at 00:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Publishpress
Publishpress publishpress Authors
Wordpress
Wordpress wordpress
Vendors & Products Publishpress
Publishpress publishpress Authors
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in PublishPress PublishPress Authors publishpress-authors allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PublishPress Authors: from n/a through <= 4.10.1.
Title WordPress PublishPress Authors plugin <= 4.10.1 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Publishpress Publishpress Authors
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:55.292Z

Reserved: 2026-02-02T12:52:29.367Z

Link: CVE-2026-25330

cve-icon Vulnrichment

Updated: 2026-02-20T16:02:35.956Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:17.597

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:30:18Z

Weaknesses