Description
Missing Authorization vulnerability in OceanWP Ocean Extra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ocean Extra: from n/a through 2.5.3.
Published: 2026-04-07
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access due to broken access control
Action: Immediate Patch
AI Analysis

Impact

Ocean Extra, a WordPress plugin by OceanWP, has a missing authorization check that allows attackers to exploit incorrectly configured access control levels. The vulnerability is classified as CWE-862 – Missing Authorization. If an attacker obtains this flaw, they could gain privileged operations within the plugin’s administrative interface, potentially accessing or modifying sensitive site data and configuration settings. The impact is the accidental or malicious escalation of privileges to a level that is normally restricted to site administrators or trusted users.

Affected Systems

The problem affects Ocean Extra plugin versions up to and including 2.5.3. WordPress sites that have installed Ocean Extra within this version range are susceptible. The precise scope is limited to sites running WordPress with the plugin present, but because the plugin interfaces with the site’s core administrative functions, the compromise can reach the entire site. Any user who can authenticate to the site with a role that receives permission to use the plugin could potentially exploit the flaw.

Risk and Exploitability

The CVSS score for this vulnerability is 5.4, indicating a medium severity. There is no EPSS data available, and the flaw is not listed in the CISA KEV catalog. The likely attack vector is an authenticated attacker navigating the plugin’s UI, where the missing authorization allows bypassing role-based restrictions. Because the vulnerability hinges on a configuration oversight rather than a network-facing flaw, the risk profile is primarily internal, but any compromised credentials or social engineering that yields a legitimate WordPress login can lead to exploitation. Site owners should treat the risk as moderate and mitigate promptly.

Generated by OpenCVE AI on April 7, 2026 at 10:20 UTC.

Remediation

Vendor Solution

Update the WordPress Ocean Extra Plugin to the latest available version (at least 2.5.4).


OpenCVE Recommended Actions

  • Update the Ocean Extra plugin to version 2.5.4 or newer.
  • If the plugin is not required, remove it from the WordPress installation.
  • After updating, review and confirm that the administrative pages of the plugin are only accessible by the intended user roles.
  • Periodically audit plugin settings and WordPress user roles to ensure no unauthorized access permissions exist.

Generated by OpenCVE AI on April 7, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Oceanwp
Oceanwp ocean Extra
Wordpress
Wordpress wordpress
Vendors & Products Oceanwp
Oceanwp ocean Extra
Wordpress
Wordpress wordpress

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in OceanWP Ocean Extra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ocean Extra: from n/a through 2.5.3.
Title WordPress Ocean Extra plugin <= 2.5.3 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Oceanwp Ocean Extra
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-07T12:59:24.495Z

Reserved: 2026-03-31T09:57:35.161Z

Link: CVE-2026-34903

cve-icon Vulnrichment

Updated: 2026-04-07T12:57:52.716Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T09:16:21.520

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-34903

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:50Z

Weaknesses