Description
Missing Authorization vulnerability in Aryan Shirani Bid Abadi Site Suggest site-suggest allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Site Suggest: from n/a through <= 1.3.9.
Published: 2026-03-05
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Broken Access Control allowing unauthorized access to plugin functionality
Action: Apply Patch
AI Analysis

Impact

Missing authorization in the Site Suggest WordPress plugin permits unauthenticated or insufficiently privileged users to invoke protected actions, potentially exposing site data or enabling configuration changes. The flaw is a classic broken access control (CWE‑862) and could allow attackers to elevate privileges or manipulate content.

Affected Systems

The plugin is distributed by Aryan Shirani Bid Abadi as Site Suggest. All releases up to and including 1.3.9 contain the vulnerability; any WordPress site using the plugin at a version <= 1.3.9 is susceptible.

Risk and Exploitability

The CVSS v3.1 score of 6.5 indicates moderate severity, while the EPSS figure of less than 1% points to a low probability of exploitation. The vulnerability has not been recorded in CISA’s KEV catalog, suggesting no publicly known exploits. Attackers would likely target the plugin’s admin endpoints via the web interface, exploiting the absence of role checks. Mitigation hinges on removing the vulnerable code by upgrading the plugin and ensuring that only administrator‑level users can access its administrative interfaces.

Generated by OpenCVE AI on April 15, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest stable release of Site Suggest (any version > 1.3.9) to remove the broken access control logic.
  • After the upgrade, verify that the plugin’s administrative URLs are accessible only to users with administrator roles by checking the role‑based permission settings in WordPress.
  • If an upgrade cannot be performed immediately, block non‑admin users from the plugin’s administrative endpoints by adding WordPress role checks or an .htaccess rule that restricts those URLs.

Generated by OpenCVE AI on April 15, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Aryan Shirani Bid Abadi
Aryan Shirani Bid Abadi site Suggest
Wordpress
Wordpress wordpress
Vendors & Products Aryan Shirani Bid Abadi
Aryan Shirani Bid Abadi site Suggest
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Aryan Shirani Bid Abadi Site Suggest site-suggest allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Site Suggest: from n/a through <= 1.3.9.
Title WordPress Site Suggest plugin <= 1.3.9 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Aryan Shirani Bid Abadi Site Suggest
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T17:44:33.806Z

Reserved: 2026-02-25T12:14:02.974Z

Link: CVE-2026-28104

cve-icon Vulnrichment

Updated: 2026-03-05T16:43:25.292Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:44.913

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-28104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:00:10Z

Weaknesses