Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27368: Missing Authorization in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd

0
Medium
VulnerabilityCVE-2026-27368cvecve-2026-27368
Published: Thu Feb 19 2026 (02/19/2026, 20:35:42 UTC)
Source: CVE Database V5
Vendor/Project: SeedProd
Product: Coming Soon Page, Under Construction & Maintenance Mode by SeedProd

Description

Missing Authorization vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd coming-soon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through <= 6.19.7.

AI-Powered Analysis

AILast updated: 02/20/2026, 07:55:12 UTC

Technical Analysis

CVE-2026-27368 identifies a missing authorization vulnerability in the SeedProd WordPress plugin 'Coming Soon Page, Under Construction & Maintenance Mode,' affecting all versions up to 6.19.7. The vulnerability arises from improperly configured access control security levels, which fail to enforce authorization checks on pages intended to be restricted during site maintenance or launch phases. This misconfiguration allows unauthenticated attackers to bypass intended access restrictions, potentially viewing or interacting with pages that should be inaccessible. The plugin is widely used to manage site visibility during development or maintenance, making this vulnerability significant for website administrators relying on SeedProd to protect sensitive pre-launch content. Although no exploits have been reported in the wild, the flaw could be exploited to gather sensitive information, reveal site structure, or interfere with site availability. The vulnerability does not require authentication or user interaction, increasing its risk profile. The lack of a CVSS score necessitates an assessment based on impact and exploitability, leading to a high severity rating. The vulnerability affects the confidentiality and integrity of site content and could be leveraged for further attacks if combined with other vulnerabilities. No official patches or mitigation links are currently provided, emphasizing the need for immediate defensive measures by administrators.

Potential Impact

The primary impact of CVE-2026-27368 is unauthorized access to pages intended to be restricted during maintenance or pre-launch phases, potentially exposing sensitive information about the website or its structure. This can lead to information disclosure, which attackers might use for reconnaissance or to facilitate further attacks. The integrity of the site could be compromised if attackers manipulate content on these pages. Additionally, availability could be affected if attackers exploit the vulnerability to disrupt site maintenance processes or launch denial-of-service attacks. Organizations relying on SeedProd for controlling site visibility risk reputational damage, data leaks, and operational disruptions. The vulnerability's ease of exploitation without authentication broadens the attack surface, making it a significant risk for websites using this plugin globally. The absence of known exploits in the wild currently limits immediate widespread impact, but the potential for exploitation remains high once details are publicized.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls at the web server or firewall level to restrict access to maintenance and coming soon pages. This can include IP whitelisting, HTTP authentication, or VPN-only access to these pages. Administrators should audit their SeedProd plugin configurations to ensure no unintended public access is allowed. Monitoring web server logs for unusual access attempts to maintenance pages can help detect exploitation attempts early. It is also advisable to keep the WordPress core and all plugins updated and subscribe to SeedProd security advisories for timely patch releases. If possible, temporarily disable the plugin or replace it with alternative solutions that enforce proper authorization until the vulnerability is resolved. Employing a web application firewall (WAF) with custom rules to block unauthorized access to maintenance endpoints can provide an additional layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-19T09:51:54.220Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699812af2c4d84f260aeb054

Added to database: 2/20/2026, 7:52:15 AM

Last enriched: 2/20/2026, 7:55:12 AM

Last updated: 2/20/2026, 9:59:45 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats