Description
Missing Authorization vulnerability in Mulika Team MIPL WC Multisite Sync mipl-wc-multisite-sync allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MIPL WC Multisite Sync: from n/a through <= 1.4.4.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Access Control Bypass
Action: Patch Immediately
AI Analysis

Impact

The vulnerability stems from missing authorization checks in the Mulika Team MIPL WC Multisite Sync WordPress plugin. Because the plugin does not enforce the correct security levels, users who should not have special privileges can perform actions normally reserved for higher‑level users. This flaw allows an attacker to read or modify data that normally belongs to other sites or administrators, potentially leading to data leakage or corruption. The weakness maps to CWE‑862, which indicates improper authorization controls.

Affected Systems

The issue affects the MIPL WC Multisite Sync plugin from Mulika Team, versions up to and including 1.4.4. Versions earlier than 1.4.4 may also be impacted, but an exact lower bound is not documented. All installations of the plugin on WordPress sites that do not enforce strict access control are vulnerable.

Risk and Exploitability

The score indicates moderate severity (CVSS 5.3) and a low probability of exploitation (EPSS < 1 %). The plugin operates within a web application context, so an attacker could potentially trigger the flaw via an HTTP request to a plugin endpoint, likely without requiring local privileges. Because the flaw is not listed in the CISA KEV catalog, there is currently no evidence of widespread active exploitation. Nonetheless, the nature of the flaw allows unauthorized access to sensitive content, making it a clear target for attackers looking to elevate privileges or exfiltrate data.

Generated by OpenCVE AI on April 13, 2026 at 21:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Back up the WordPress site and database before making changes.
  • Upgrade the MIPL WC Multisite Sync plugin to the latest available version, which removes the missing authorization checks.
  • After upgrading, review and confirm that the plugin’s access control settings are correctly configured to restrict privileges.
  • Continuously monitor site logs for abnormal activity around plugin-managed resources.

Generated by OpenCVE AI on April 13, 2026 at 21:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Mulika Team
Mulika Team mipl Wc Multisite Sync
Wordpress
Wordpress wordpress
Vendors & Products Mulika Team
Mulika Team mipl Wc Multisite Sync
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Mulika Team MIPL WC Multisite Sync mipl-wc-multisite-sync allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MIPL WC Multisite Sync: from n/a through <= 1.4.4.
Title WordPress MIPL WC Multisite Sync plugin <= 1.4.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Mulika Team Mipl Wc Multisite Sync
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:04.408Z

Reserved: 2026-04-07T10:58:22.476Z

Link: CVE-2026-39705

cve-icon Vulnrichment

Updated: 2026-04-13T18:18:07.940Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:43.230

Modified: 2026-04-24T18:05:35.730

Link: CVE-2026-39705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:23Z

Weaknesses