Impact
Missing Authorization vulnerability in Majestic Support plugin allows exploitation of incorrectly configured access control security levels. The flaw permits users without proper authorization to access plugin functions that should be restricted, potentially allowing unauthorized manipulation of support tickets or other plugin features.
Affected Systems
All installations of the Majestic Support WordPress plugin with version 1.1.2 or older are affected. No minimum version is specified; the vulnerability exists across all releases up to and including 1.1.2.
Risk and Exploitability
The CVSS score is 5.3, and the EPSS score is less than 1%, indicating a moderate severity and a very low but non‑zero exploitation probability. The vulnerability is likely accessible remotely through HTTP requests to the plugin’s endpoints. Based on the description, the attack vector is inferred to be web‑based, requiring an authenticated or unauthenticated user to send crafted requests that bypass the plugin’s access checks. The flaw is classified as privilege escalation (CWE‑862). It is not included in the CISA Known Exploited Vulnerabilities catalog.
OpenCVE Enrichment