Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25410: Missing Authorization in tstephenson WP-CORS

0
Medium
VulnerabilityCVE-2026-25410cvecve-2026-25410
Published: Thu Feb 19 2026 (02/19/2026, 08:27:05 UTC)
Source: CVE Database V5
Vendor/Project: tstephenson
Product: WP-CORS

Description

Missing Authorization vulnerability in tstephenson WP-CORS wp-cors allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-CORS: from n/a through <= 0.2.2.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:28:24 UTC

Technical Analysis

CVE-2026-25410 identifies a missing authorization vulnerability in the WP-CORS plugin for WordPress, developed by tstephenson, affecting all versions up to and including 0.2.2. WP-CORS is designed to manage Cross-Origin Resource Sharing (CORS) policies for WordPress sites, which control how resources are shared across different origins. The vulnerability arises from improperly configured access control mechanisms within the plugin, allowing unauthorized users to bypass authorization checks. This missing authorization means that attackers can potentially invoke privileged plugin functionality or access sensitive data without proper permissions. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although no exploits have been reported in the wild yet, the flaw could be leveraged by attackers to facilitate further compromise of WordPress sites, including data leakage, privilege escalation, or facilitating cross-site scripting (XSS) or cross-site request forgery (CSRF) attacks. The lack of an official patch or update at the time of publication necessitates immediate attention from administrators using this plugin. The vulnerability affects the confidentiality and integrity of affected systems by exposing unauthorized access paths. Given WordPress's widespread use in Europe for websites and e-commerce platforms, this vulnerability poses a significant risk to organizations relying on WP-CORS for CORS management.

Potential Impact

For European organizations, the impact of CVE-2026-25410 can be substantial. Unauthorized access due to missing authorization can lead to exposure of sensitive data, unauthorized modification of website content or configurations, and potential compromise of user data. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and result in financial losses. Public-facing websites using WP-CORS are particularly vulnerable to exploitation attempts that could disrupt service availability or enable further attacks such as injection or session hijacking. The vulnerability's ease of exploitation without authentication increases the risk of automated attacks targeting vulnerable WordPress installations. Organizations in sectors such as e-commerce, government, healthcare, and finance, which rely heavily on WordPress for their web presence, may face increased risk of data breaches or service disruptions. Additionally, the lack of a patch means organizations must rely on interim mitigations, which may not fully eliminate risk. The potential for cascading effects in complex web environments underscores the importance of prompt action.

Mitigation Recommendations

1. Immediately audit all WordPress installations to identify the presence of the WP-CORS plugin, specifically versions up to 0.2.2. 2. Disable or uninstall the WP-CORS plugin until an official patch or update addressing the vulnerability is released. 3. If disabling the plugin is not feasible, implement strict access controls at the web server or application firewall level to restrict access to endpoints exposed by WP-CORS. 4. Review and harden CORS policies manually to ensure that only trusted origins are allowed, minimizing exposure. 5. Monitor web server logs and WordPress activity for unusual or unauthorized access attempts targeting WP-CORS functionality. 6. Stay informed about vendor updates or patches and apply them promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this vulnerability. 8. Educate site administrators about the risks of unauthorized access and the importance of plugin management and timely updates. 9. Conduct penetration testing focused on access control weaknesses in WordPress plugins to proactively identify similar issues. 10. Maintain regular backups of WordPress sites to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-02T12:53:19.001Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996d03d6aea4a407a4bdb91

Added to database: 2/19/2026, 8:56:29 AM

Last enriched: 2/19/2026, 9:28:24 AM

Last updated: 2/21/2026, 12:16:00 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats