Description
Missing Authorization vulnerability in wp-configurator WP Configurator Pro wp-configurator-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Configurator Pro: from n/a through <= 3.7.9.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to protected plugin resources
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a missing authorization flaw that permits an attacker to exploit incorrectly configured access control security levels in WP Configurator Pro. Because the plugin does not enforce proper permissions, a malicious actor can potentially view, modify, or delete configuration data normally restricted to privileged users, thereby affecting data confidentiality and integrity of the WordPress site. The weakness is identified as a classic authorization bypass (CWE-862).

Affected Systems

All installations of the WP Configurator Pro WordPress plugin with versions up to and including 3.7.9 are affected. The plugin is used within WordPress sites, so any site that has not upgraded beyond 3.7.9 is at risk.

Risk and Exploitability

The CVSS v3.1 score of 7.1 indicates a high severity level, while the EPSS score of less than 1% suggests that the likelihood of exploitation is currently low, and the vulnerability is not listed in the CISA KEV catalog. The missing authorization control is most likely exploitable through remote web requests to the plugin's administrative endpoints, though the specific attack vector is inferred from the description rather than explicitly stated. The availability of the flaw across all affected versions means a single design oversight could enable widespread unauthorized access if an attacker targets a site that has not applied the recommended fix.

Generated by OpenCVE AI on March 26, 2026 at 20:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Configurator Pro to version 3.8.0 or later to ensure proper access controls are enforced
  • Verify that all administrative endpoints of the plugin require authenticated and authorized users before granting access
  • If an immediate upgrade is not possible, restrict access to the plugin’s admin pages to trusted user roles or disable the plugin until a patch is applied

Generated by OpenCVE AI on March 26, 2026 at 20:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp-configurator
Wp-configurator wp Configurator Pro
Vendors & Products Wordpress
Wordpress wordpress
Wp-configurator
Wp-configurator wp Configurator Pro

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in wp-configurator WP Configurator Pro wp-configurator-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Configurator Pro: from n/a through <= 3.7.9.
Title WordPress WP Configurator Pro plugin <= 3.7.9 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
Wp-configurator Wp Configurator Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-26T18:53:47.105Z

Reserved: 2026-03-12T11:12:07.663Z

Link: CVE-2026-32501

cve-icon Vulnrichment

Updated: 2026-03-26T18:53:32.192Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:17:02.080

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-32501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:31:00Z

Weaknesses