Description
Missing Authorization vulnerability in Glowlogix WP Frontend Profile wp-front-end-profile allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Frontend Profile: from n/a through <= 1.3.9.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Access Control Bypass
Action: Apply Patch
AI Analysis

Impact

The WP Frontend Profile plugin (versions up to 1.3.9) contains a missing authorization flaw that lets attackers bypass the plugin’s access control checks. When exploited, a user without sufficient privileges can gain unauthorized access to protected areas of the WordPress site, potentially reading or modifying sensitive user data. The weakness is classified as CWE-862, indicating an incorrect authorization mechanism.

Affected Systems

The vulnerability affects the Glowlogix WP Frontend Profile plugin released for WordPress. All installations using version 1.3.9 or earlier are vulnerable. No other product versions are specified as affected in the public disclosure.

Risk and Exploitability

The CVSS score of 5.3 highlights a medium severity risk. The EPSS score is less than 1%, suggesting the likelihood of exploitation is low, and the vulnerability is not listed in the CISA KEV catalog. The active attack vector is likely a web-based request that a site administrator or privileged user could run, though the description does not explicitly state remote code execution or other advanced capabilities; the inferred attack scenario involves unauthenticated or low-privilege users sending crafted requests to obtain elevated access. Because of the moderate CVSS rating and low EPSS, the risk is considered moderate, but patching is recommended to eliminate the access control bypass.

Generated by OpenCVE AI on April 8, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Frontend Profile plugin to version 1.4.0 or later, if available, following the vendor's release notes.
  • Disable or remove the WP Frontend Profile plugin from the WordPress installation if a newer version cannot be obtained.
  • Review the WordPress user roles and capabilities to ensure no unintended permissions are granted to the plugin.
  • Monitor site activity logs for anomalous access or configuration changes that might indicate exploitation attempts.
  • Keep other WordPress core files and plugins updated to reduce the overall attack surface.

Generated by OpenCVE AI on April 8, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Glowlogix
Glowlogix wp Frontend Profile
Wordpress
Wordpress wordpress
Vendors & Products Glowlogix
Glowlogix wp Frontend Profile
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Glowlogix WP Frontend Profile wp-front-end-profile allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Frontend Profile: from n/a through <= 1.3.9.
Title WordPress WP Frontend Profile plugin <= 1.3.9 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Glowlogix Wp Frontend Profile
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:04.014Z

Reserved: 2026-04-07T10:58:10.483Z

Link: CVE-2026-39688

cve-icon Vulnrichment

Updated: 2026-04-08T14:38:56.554Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:40.790

Modified: 2026-04-29T10:17:40.693

Link: CVE-2026-39688

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:40:32Z

Weaknesses