Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
Update the WordPress Really Simple Security Pro plugin to the latest available version (at least 9.5.4.1).
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0. | |
| Title | WordPress Really Simple Security Pro plugin <= 9.5.4.0 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-03-19T05:30:18.525Z
Reserved: 2026-02-19T09:52:08.214Z
Link: CVE-2026-27397
No data.
Status : Received
Published: 2026-03-19T06:16:25.410
Modified: 2026-03-19T06:16:25.410
Link: CVE-2026-27397
No data.
OpenCVE Enrichment
No data.
Weaknesses