Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32350: Missing Authorization in wpradiant Chocolate House

0
Medium
VulnerabilityCVE-2026-32350cvecve-2026-32350
Published: Fri Mar 13 2026 (03/13/2026, 11:41:58 UTC)
Source: CVE Database V5
Vendor/Project: wpradiant
Product: Chocolate House

Description

Missing Authorization vulnerability in wpradiant Chocolate House chocolate-house allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chocolate House: from n/a through <= 1.1.5.

AI-Powered Analysis

AILast updated: 03/13/2026, 13:17:07 UTC

Technical Analysis

CVE-2026-32350 identifies a missing authorization vulnerability in the wpradiant Chocolate House software, specifically affecting versions up to 1.1.5. This vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict user permissions. As a result, attackers can exploit this weakness to perform unauthorized actions within the application, potentially accessing or modifying sensitive data without proper credentials. The vulnerability is categorized under missing authorization, a critical security flaw that undermines the integrity and confidentiality of the system. Although no known exploits are currently documented in the wild, the absence of authentication requirements for exploitation increases the risk profile. The lack of a CVSS score means severity must be inferred from the nature of the flaw: missing authorization typically allows attackers to bypass security controls, leading to unauthorized data access or privilege escalation. The vulnerability affects all deployments of Chocolate House up to version 1.1.5, but no specific affected versions are detailed beyond this. No patches or mitigation links are currently available, indicating that users must rely on configuration reviews and monitoring until vendor fixes are released. The vulnerability was published on March 13, 2026, by Patchstack, with the CVE reserved a day earlier. Given the product’s niche and the type of vulnerability, organizations using Chocolate House should consider this a high-risk issue requiring immediate attention once patches are available.

Potential Impact

The missing authorization vulnerability in Chocolate House can have significant impacts on organizations worldwide. Unauthorized access can lead to exposure or modification of sensitive business data, potentially resulting in data breaches, intellectual property theft, or disruption of business processes. Integrity of data and system configurations may be compromised, enabling attackers to escalate privileges or manipulate application behavior. Since the vulnerability likely does not require authentication, attackers can exploit it remotely without valid credentials, increasing the attack surface. This can lead to lateral movement within networks if Chocolate House is integrated with other systems. Organizations in sectors relying on Chocolate House for critical operations may face operational disruptions and reputational damage. The absence of known exploits currently reduces immediate risk, but the vulnerability remains a critical concern until patched. Additionally, regulatory compliance issues may arise if unauthorized data access occurs due to this flaw.

Mitigation Recommendations

To mitigate CVE-2026-32350, organizations should first conduct a thorough audit of access control configurations within Chocolate House to identify and correct any improperly set permissions. Until an official patch is released, restrict access to the application to trusted users and networks, employing network segmentation and firewall rules to limit exposure. Implement strict monitoring and logging of user activities to detect unusual or unauthorized access attempts promptly. Employ multi-factor authentication (MFA) where possible to add an additional layer of security, even if the vulnerability itself bypasses authorization checks. Engage with the vendor wpradiant for updates and apply patches immediately upon release. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting known vulnerable endpoints. Regularly review and update security policies related to user roles and permissions. Finally, educate administrators and users about the risks and signs of exploitation to enhance early detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-12T11:10:47.068Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3fc6c2f860ef943d17941

Added to database: 3/13/2026, 12:00:44 PM

Last enriched: 3/13/2026, 1:17:07 PM

Last updated: 3/15/2026, 1:01:59 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses