Impact
Missing Authorization vulnerability in Majestic Support plugin allows exploitation of incorrectly configured access control security levels. The flaw permits users without proper authorization to access plugin functions that should be restricted, potentially allowing unauthorized manipulation of support tickets or other plugin features.
Affected Systems
All installations of the Majestic Support WordPress plugin with version 1.1.2 or older are affected. No minimum version is specified; the vulnerability exists across all releases up to and including 1.1.2.
Risk and Exploitability
The CVSS score is unavailable, and EPSS data is not provided, meaning the exact severity and likelihood of exploitation are not quantified. The vulnerability is likely accessible remotely through HTTP requests to the plugin’s endpoints. Based on the description, the attack vector is inferred to be web‑based, requiring an authenticated or unauthenticated user to send crafted requests that bypass the plugin’s access checks. The flaw is classified as a privilege escalation (CWE‑862).
OpenCVE Enrichment