Description
Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Majestic Support: from n/a through <= 1.1.2.
Published: 2026-04-15
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Missing Authorization vulnerability in Majestic Support plugin allows exploitation of incorrectly configured access control security levels. The flaw permits users without proper authorization to access plugin functions that should be restricted, potentially allowing unauthorized manipulation of support tickets or other plugin features.

Affected Systems

All installations of the Majestic Support WordPress plugin with version 1.1.2 or older are affected. No minimum version is specified; the vulnerability exists across all releases up to and including 1.1.2.

Risk and Exploitability

The CVSS score is unavailable, and EPSS data is not provided, meaning the exact severity and likelihood of exploitation are not quantified. The vulnerability is likely accessible remotely through HTTP requests to the plugin’s endpoints. Based on the description, the attack vector is inferred to be web‑based, requiring an authenticated or unauthenticated user to send crafted requests that bypass the plugin’s access checks. The flaw is classified as a privilege escalation (CWE‑862).

Generated by OpenCVE AI on April 15, 2026 at 11:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Majestic Support plugin to version 1.1.3 or newer to remove the missing authorization flaw.
  • If an upgrade cannot be performed immediately, disable or uninstall the plugin to block unauthenticated access to its functions.
  • Apply role‑based access control or configuration changes that limit the capabilities exposed by the plugin to only trusted user roles.
  • Configure monitoring of WordPress logs to detect any ongoing unauthorized attempts to access the plugin’s protected features.

Generated by OpenCVE AI on April 15, 2026 at 11:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Majesticsupport
Majesticsupport majestic Support
Wordpress
Wordpress wordpress
Vendors & Products Majesticsupport
Majesticsupport majestic Support
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Majestic Support: from n/a through <= 1.1.2.
Title WordPress Majestic Support plugin <= 1.1.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Majesticsupport Majestic Support
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-15T10:21:35.665Z

Reserved: 2026-04-15T09:20:36.793Z

Link: CVE-2026-40778

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-15T11:16:36.900

Modified: 2026-04-15T11:16:36.900

Link: CVE-2026-40778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T13:38:28Z

Weaknesses