Description
Missing Authorization vulnerability in Really Simple Plugins Really Simple SSL really-simple-ssl allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple SSL: from n/a through <= 9.5.7.
Published: 2026-03-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Missing Authorization
Action: Immediate Update
AI Analysis

Impact

A missing authorization condition in the Really Simple SSL plugin version 9.5.7 and earlier allows an attacker to exploit incorrectly configured access control security levels. The vulnerability is a classic broken access control flaw (CWE-862) that can give unauthorized access to sensitive plugin settings, potentially compromising site configuration or other protected data.

Affected Systems

The affected product is the Really Simple SSL plugin from Really Simple Plugins. All releases from the initial public release up to and including version 9.5.7 are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, but the lack of a specific attack vector in the documents leads to the inference that the exploit most likely occurs through the plugin’s administrative web interface or exposed HTTP endpoints. An attacker would need to craft requests that bypass normal access checks to manipulate plugin settings or extract sensitive information.

Generated by OpenCVE AI on March 19, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest plugin version (9.5.8 or later) from the vendor.
  • If an upgrade is not yet possible, restrict access to the Really Simple SSL admin pages using WordPress role management or server‑side access controls such as .htaccess rules.
  • Monitor for official security notices or patches from Really Simple Plugins and update promptly once available.

Generated by OpenCVE AI on March 19, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Really-simple-plugins
Really-simple-plugins really Simple Ssl
Wordpress
Wordpress wordpress
Vendors & Products Really-simple-plugins
Really-simple-plugins really Simple Ssl
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Really Simple Plugins Really Simple SSL really-simple-ssl allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple SSL: from n/a through <= 9.5.7.
Title WordPress Really Simple SSL plugin <= 9.5.7 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Really-simple-plugins Really Simple Ssl
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:22.438Z

Reserved: 2026-03-12T11:11:45.408Z

Link: CVE-2026-32461

cve-icon Vulnrichment

Updated: 2026-03-13T18:32:19.204Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:08.580

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:03:05Z

Weaknesses