Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25336: Missing Authorization in wpcoachify Coachify

0
Medium
VulnerabilityCVE-2026-25336cvecve-2026-25336
Published: Thu Feb 19 2026 (02/19/2026, 08:26:57 UTC)
Source: CVE Database V5
Vendor/Project: wpcoachify
Product: Coachify

Description

Missing Authorization vulnerability in wpcoachify Coachify coachify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Coachify: from n/a through <= 1.1.5.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:44:55 UTC

Technical Analysis

CVE-2026-25336 identifies a Missing Authorization vulnerability in the wpcoachify Coachify WordPress plugin, specifically affecting versions up to and including 1.1.5. The vulnerability arises from incorrectly configured access control security levels, which means that certain functions or data within the plugin can be accessed or manipulated without proper authorization checks. This type of flaw typically occurs when the application fails to verify whether a user has the necessary permissions before allowing access to sensitive operations or information. The absence of a CVSS score and patch links suggests that this vulnerability is newly disclosed and may not yet have an official fix. The plugin is used to provide coaching-related functionalities on WordPress sites, so exploitation could lead to unauthorized data exposure, modification, or functionality abuse. Although no known exploits are reported in the wild, the risk remains significant due to the nature of the vulnerability. Attackers could potentially leverage this flaw to escalate privileges, access confidential user data, or disrupt service integrity. The vulnerability does not require user interaction or authentication, increasing its exploitation potential. Since WordPress powers a substantial portion of websites globally, including many in Europe, the impact could be widespread if not addressed promptly.

Potential Impact

For European organizations, the impact of CVE-2026-25336 could be considerable, especially for those relying on the Coachify plugin for client engagement or coaching services. Unauthorized access could lead to exposure of sensitive client information, breach of privacy regulations such as GDPR, and damage to organizational reputation. Integrity of coaching content or user data could be compromised, potentially affecting service quality and trust. Availability might also be indirectly impacted if attackers manipulate plugin functionalities to disrupt normal operations. Given the plugin’s role in user interaction, exploitation could facilitate further attacks such as privilege escalation or lateral movement within compromised WordPress environments. Organizations in sectors like education, health coaching, and consultancy that use this plugin are particularly at risk. The lack of patches means organizations must proactively assess and mitigate the vulnerability to avoid regulatory penalties and operational disruptions.

Mitigation Recommendations

1. Immediately audit all WordPress sites using the Coachify plugin to identify affected versions (<=1.1.5). 2. Disable or remove the plugin until a security patch or update is released by the vendor. 3. Implement strict access control policies at the WordPress level, including role-based access restrictions and limiting plugin management to trusted administrators. 4. Monitor web server and application logs for unusual access patterns or unauthorized attempts to invoke plugin functionalities. 5. Employ Web Application Firewalls (WAF) with custom rules to block suspicious requests targeting Coachify endpoints. 6. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 7. Conduct a thorough security review of all plugins and themes to detect similar authorization weaknesses. 8. Educate site administrators on the risks of installing unverified plugins and the importance of timely updates. 9. Consider implementing multi-factor authentication (MFA) for WordPress admin accounts to reduce risk of unauthorized access. 10. Backup site data regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-02T12:52:37.307Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996d03a6aea4a407a4bdada

Added to database: 2/19/2026, 8:56:26 AM

Last enriched: 2/19/2026, 9:44:55 AM

Last updated: 2/21/2026, 12:15:21 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats