Description
Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Majestic Support: from n/a through <= 1.1.2.
Published: 2026-04-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Missing Authorization vulnerability in Majestic Support plugin allows exploitation of incorrectly configured access control security levels. The flaw permits users without proper authorization to access plugin functions that should be restricted, potentially allowing unauthorized manipulation of support tickets or other plugin features.

Affected Systems

All installations of the Majestic Support WordPress plugin with version 1.1.2 or older are affected. No minimum version is specified; the vulnerability exists across all releases up to and including 1.1.2.

Risk and Exploitability

The CVSS score is 5.3, and the EPSS score is less than 1%, indicating a moderate severity and a very low but non‑zero exploitation probability. The vulnerability is likely accessible remotely through HTTP requests to the plugin’s endpoints. Based on the description, the attack vector is inferred to be web‑based, requiring an authenticated or unauthenticated user to send crafted requests that bypass the plugin’s access checks. The flaw is classified as privilege escalation (CWE‑862). It is not included in the CISA Known Exploited Vulnerabilities catalog.

Generated by OpenCVE AI on April 17, 2026 at 06:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Majestic Support plugin to version 1.1.3 or newer to remove the missing authorization flaw.
  • If an upgrade cannot be performed immediately, disable or uninstall the plugin to block unauthenticated access to its functions.
  • Apply role‑based access control or configuration changes that limit the capabilities exposed by the plugin to only trusted user roles.
  • Configure monitoring of WordPress logs to detect any ongoing unauthorized attempts to access the plugin’s protected features.

Generated by OpenCVE AI on April 17, 2026 at 06:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Majesticsupport
Majesticsupport majestic Support
Wordpress
Wordpress wordpress
Vendors & Products Majesticsupport
Majesticsupport majestic Support
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Majestic Support: from n/a through <= 1.1.2.
Title WordPress Majestic Support plugin <= 1.1.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Majesticsupport Majestic Support
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:04.975Z

Reserved: 2026-04-15T09:20:36.793Z

Link: CVE-2026-40778

cve-icon Vulnrichment

Updated: 2026-04-16T14:33:51.935Z

cve-icon NVD

Status : Deferred

Published: 2026-04-15T11:16:36.900

Modified: 2026-04-29T10:17:45.873

Link: CVE-2026-40778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T07:00:08Z

Weaknesses