Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1558: CWE-639 Authorization Bypass Through User-Controlled Key in brechtvds WP Recipe Maker

0
Medium
VulnerabilityCVE-2026-1558cvecve-2026-1558cwe-639
Published: Fri Feb 27 2026 (02/27/2026, 04:33:03 UTC)
Source: CVE Database V5
Vendor/Project: brechtvds
Product: WP Recipe Maker

Description

CVE-2026-1558 is a medium-severity Insecure Direct Object Reference (IDOR) vulnerability in the WP Recipe Maker WordPress plugin versions up to 10. 3. 2. The vulnerability arises because the /wp-json/wp-recipe-maker/v1/integrations/instacart REST API endpoint's permission callback is set to always allow access (__return_true), and there are no authorization or ownership checks on the user-supplied recipeId parameter. This flaw enables unauthenticated attackers to overwrite arbitrary post metadata (specifically wprm_instacart_combinations) for any post on the affected WordPress site. Although it does not impact confidentiality or availability, it allows integrity compromise of post metadata without authentication or user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data manipulation.

AI-Powered Analysis

AILast updated: 02/27/2026, 16:12:32 UTC

Technical Analysis

The WP Recipe Maker plugin for WordPress, developed by brechtvds, contains a critical security flaw identified as CVE-2026-1558. This vulnerability is classified as an Insecure Direct Object Reference (IDOR), falling under CWE-639, which occurs when an application exposes internal implementation objects to users without proper authorization checks. Specifically, the REST API endpoint /wp-json/wp-recipe-maker/v1/integrations/instacart has its permission_callback set to __return_true, effectively disabling any permission enforcement. Consequently, any unauthenticated attacker can supply arbitrary recipeId values to this endpoint and overwrite the post metadata field wprm_instacart_combinations for any post ID on the WordPress site. This metadata manipulation could lead to data integrity issues, potentially affecting how recipes are displayed or integrated with Instacart services. The vulnerability affects all versions up to and including 10.3.2 of the plugin. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the lack of confidentiality or availability impact but significant integrity risk. No authentication or user interaction is required to exploit this flaw, increasing its risk profile. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of CVE-2026-1558 is the unauthorized modification of post metadata on WordPress sites using the vulnerable WP Recipe Maker plugin. This can lead to data integrity issues, such as corrupted or misleading recipe information, which could degrade user trust and site functionality. For e-commerce integrations like Instacart, manipulated metadata might disrupt shopping list generation or cause incorrect product associations, potentially affecting business operations. Although the vulnerability does not expose sensitive data or cause denial of service, the ability for unauthenticated attackers to alter content undermines the integrity of the affected website. This could be leveraged in broader attacks, such as injecting malicious links or misleading users, indirectly impacting brand reputation and user safety. Organizations relying on this plugin for recipe management or e-commerce integration should consider the risk of unauthorized content manipulation significant, especially for high-traffic or commercial sites.

Mitigation Recommendations

To mitigate CVE-2026-1558, organizations should immediately update the WP Recipe Maker plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators can implement temporary mitigations such as restricting access to the vulnerable REST API endpoint via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting /wp-json/wp-recipe-maker/v1/integrations/instacart. Additionally, reviewing and hardening REST API permission callbacks in custom or third-party plugins is recommended to ensure proper authorization checks are enforced. Site owners should audit post metadata for unauthorized changes and monitor logs for suspicious API activity. Employing WordPress security plugins that monitor REST API usage and applying the principle of least privilege for plugin capabilities can further reduce risk. Finally, maintaining regular backups of site data will aid in recovery if unauthorized modifications occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-28T18:19:24.671Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1be9b32ffcdb8a23e7063

Added to database: 2/27/2026, 3:56:11 PM

Last enriched: 2/27/2026, 4:12:32 PM

Last updated: 2/27/2026, 6:05:14 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses