Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0.

Subscriptions

No data.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

Update the WordPress Really Simple Security Pro plugin to the latest available version (at least 9.5.4.1).


Workaround

No workaround given by the vendor.

History

Thu, 19 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0.
Title WordPress Really Simple Security Pro plugin <= 9.5.4.0 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-19T05:30:18.525Z

Reserved: 2026-02-19T09:52:08.214Z

Link: CVE-2026-27397

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-19T06:16:25.410

Modified: 2026-03-19T06:16:25.410

Link: CVE-2026-27397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses