Description
Missing Authorization vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Seriously Simple Podcasting: from n/a through <= 3.14.2.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access and Data Tampering
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from a missing authorization check in Craig Hewitt’s Seriously Simple Podcasting plugin. Because access controls are incorrectly configured, an attacker can reach privileged functions—such as creating, editing, or deleting podcasts, and viewing private media—without being authenticated. The flaw is a classic broken access control scenario, classified as CWE‑862. Successful exploitation could allow an attacker to read, modify, or erase podcast content and administrative settings, jeopardizing confidentiality, integrity, and availability of the site’s media assets.

Affected Systems

The flaw exists in the Seriously Simple Podcasting WordPress plugin from all versions that have not yet been upgraded past 3.14.2. Any WordPress installation that still hosts a vulnerable version of this plugin is potentially affected, regardless of the site’s overall configuration.

Risk and Exploitability

The CVSS base score of 5.3 indicates medium severity, and the EPSS score of less than 1 % suggests a low probability of active exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread attacks. Based on the description, the attack vector is likely web‑based, leveraging HTTP requests to the plugin’s endpoints that lack proper authorization. Although the flaw could be abused remotely via the public web interface, no evidence currently points to widespread exploitation, and the overall risk remains moderate.

Generated by OpenCVE AI on April 10, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Seriously Simple Podcasting plugin to the latest version (3.15 or newer).
  • Verify that the plugin is no longer listed as vulnerable in your CMS security scans.
  • If an immediate upgrade cannot be performed, restrict access to the plugin’s administrative pages to users with the "Administrator" role or remove the plugin entirely.
  • Monitor the website’s access logs for anomalous activity targeting podcast management endpoints.
  • Keep the WordPress core and all plugins regularly updated.

Generated by OpenCVE AI on April 10, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress
Vendors & Products Craig Hewitt
Craig Hewitt seriously Simple Podcasting
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Seriously Simple Podcasting: from n/a through <= 3.14.2.
Title WordPress Seriously Simple Podcasting plugin <= 3.14.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Craig Hewitt Seriously Simple Podcasting
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-10T18:02:32.423Z

Reserved: 2026-04-07T10:47:50.136Z

Link: CVE-2026-39505

cve-icon Vulnrichment

Updated: 2026-04-10T18:02:14.780Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:24.647

Modified: 2026-04-24T18:08:35.440

Link: CVE-2026-39505

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:25:31Z

Weaknesses