Description
Missing Authorization vulnerability in themebeez Royale News royale-news allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Royale News: from n/a through <= 2.2.4.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Apply Patch
AI Analysis

Impact

This vulnerability is a missing authorization flaw in the WordPress Royale News theme that allows attackers to perform actions that should be restricted. The flaw stems from incorrectly configured access control security levels, which can lead to unauthorized reading, modification, or deletion of content that should be protected. The weakness is identified as CWE-862, indicating a failure in authorization checks.

Affected Systems

The issue affects the Royale News WordPress theme version 2.2.4 and all earlier releases. Any website that still uses one of these versions of the theme is potentially vulnerable, regardless of other plugins or core WordPress updates. The vulnerability is isolated to the theme itself and does not involve the core platform.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests that exploitation is currently rare. The vulnerability is not listed in the CISA KEV catalog. The description does not state whether the attack requires authenticated access or a particular user role, so it is inferred that the missing authorization check could be exploited by any user who can send crafted requests to the website. Because the flaw is a missing authorization check, attackers who can access the site may leverage it without additional prerequisites.

Generated by OpenCVE AI on April 13, 2026 at 22:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Royale News theme to a version newer than 2.2.4 as soon as a compatible update becomes available
  • If an update is not available, remove or deactivate the Royale News theme until a patch is released
  • Verify that WordPress core and other plugins are up‑to‑date and not introducing similar access control gaps
  • Review the site's custom role and capability settings to ensure no unintended permissions are granted
  • Monitor web logs for suspicious activity that may indicate exploitation attempts

Generated by OpenCVE AI on April 13, 2026 at 22:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Themebeez
Themebeez royale News
Wordpress
Wordpress wordpress
Vendors & Products Themebeez
Themebeez royale News
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in themebeez Royale News royale-news allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Royale News: from n/a through <= 2.2.4.
Title WordPress Royale News theme <= 2.2.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Themebeez Royale News
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:03.911Z

Reserved: 2026-04-07T10:57:48.107Z

Link: CVE-2026-39649

cve-icon Vulnrichment

Updated: 2026-04-13T18:19:20.819Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:35.883

Modified: 2026-04-24T18:06:24.707

Link: CVE-2026-39649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:52Z

Weaknesses