CVE-2026-32378: Missing Authorization in raratheme Book Landing Page
Missing Authorization vulnerability in raratheme Book Landing Page book-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Book Landing Page: from n/a through <= 1.2.7.
AI Analysis
Technical Summary
CVE-2026-32378 identifies a Missing Authorization vulnerability in the raratheme Book Landing Page plugin, specifically affecting versions up to and including 1.2.7. The vulnerability arises from incorrectly configured access control security levels, which means that the plugin fails to properly verify whether a user has the necessary permissions before granting access to certain resources or functionalities. This type of vulnerability is critical because it can allow unauthorized users to bypass intended restrictions, potentially exposing sensitive data or enabling unauthorized actions within the affected plugin's scope. The Book Landing Page plugin is typically used on WordPress sites to create and manage book-related landing pages, often involving customer interactions or content management. The lack of proper authorization checks can lead to confidentiality breaches or unauthorized modifications. Although no CVSS score has been assigned, the nature of the vulnerability suggests a significant security risk. No patches or fixes have been officially published at the time of this report, and no known exploits have been observed in the wild. The vulnerability was reserved and published in March 2026 by Patchstack, a known security vendor specializing in WordPress plugin vulnerabilities. Organizations using this plugin should monitor for updates and assess their exposure promptly.
Potential Impact
The impact of CVE-2026-32378 can be substantial for organizations using the affected Book Landing Page plugin. Unauthorized access due to missing authorization can lead to exposure of sensitive information, unauthorized content modification, or manipulation of user interactions on landing pages. This can damage organizational reputation, result in data breaches, and potentially facilitate further attacks if attackers leverage the unauthorized access to pivot within the network. Since the plugin is used in WordPress environments, which are widely deployed globally, the scope of affected systems is broad. The absence of authentication requirements for exploitation increases the risk, making it easier for attackers to exploit the vulnerability remotely. The integrity and confidentiality of data managed by the plugin are primarily at risk, while availability impact is likely limited unless attackers use the access to disrupt services. Organizations in sectors relying heavily on digital marketing, e-commerce, or publishing are particularly vulnerable due to the plugin’s typical use cases.
Mitigation Recommendations
To mitigate the risks posed by CVE-2026-32378, organizations should take the following specific actions: 1) Immediately audit the access control configurations of the Book Landing Page plugin to identify any unauthorized access paths. 2) Restrict plugin access to trusted users and roles until an official patch is released. 3) Monitor web server and application logs for unusual access patterns or attempts to exploit the plugin. 4) Implement web application firewall (WAF) rules to block suspicious requests targeting the plugin endpoints. 5) Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 6) Consider temporarily disabling the plugin if it is not critical to operations or if the risk is deemed unacceptable. 7) Educate site administrators on the importance of least privilege principles and regularly review user permissions related to the plugin. 8) Employ security scanning tools specialized in WordPress plugin vulnerabilities to detect similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2026-32378: Missing Authorization in raratheme Book Landing Page
Description
Missing Authorization vulnerability in raratheme Book Landing Page book-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Book Landing Page: from n/a through <= 1.2.7.
AI-Powered Analysis
Technical Analysis
CVE-2026-32378 identifies a Missing Authorization vulnerability in the raratheme Book Landing Page plugin, specifically affecting versions up to and including 1.2.7. The vulnerability arises from incorrectly configured access control security levels, which means that the plugin fails to properly verify whether a user has the necessary permissions before granting access to certain resources or functionalities. This type of vulnerability is critical because it can allow unauthorized users to bypass intended restrictions, potentially exposing sensitive data or enabling unauthorized actions within the affected plugin's scope. The Book Landing Page plugin is typically used on WordPress sites to create and manage book-related landing pages, often involving customer interactions or content management. The lack of proper authorization checks can lead to confidentiality breaches or unauthorized modifications. Although no CVSS score has been assigned, the nature of the vulnerability suggests a significant security risk. No patches or fixes have been officially published at the time of this report, and no known exploits have been observed in the wild. The vulnerability was reserved and published in March 2026 by Patchstack, a known security vendor specializing in WordPress plugin vulnerabilities. Organizations using this plugin should monitor for updates and assess their exposure promptly.
Potential Impact
The impact of CVE-2026-32378 can be substantial for organizations using the affected Book Landing Page plugin. Unauthorized access due to missing authorization can lead to exposure of sensitive information, unauthorized content modification, or manipulation of user interactions on landing pages. This can damage organizational reputation, result in data breaches, and potentially facilitate further attacks if attackers leverage the unauthorized access to pivot within the network. Since the plugin is used in WordPress environments, which are widely deployed globally, the scope of affected systems is broad. The absence of authentication requirements for exploitation increases the risk, making it easier for attackers to exploit the vulnerability remotely. The integrity and confidentiality of data managed by the plugin are primarily at risk, while availability impact is likely limited unless attackers use the access to disrupt services. Organizations in sectors relying heavily on digital marketing, e-commerce, or publishing are particularly vulnerable due to the plugin’s typical use cases.
Mitigation Recommendations
To mitigate the risks posed by CVE-2026-32378, organizations should take the following specific actions: 1) Immediately audit the access control configurations of the Book Landing Page plugin to identify any unauthorized access paths. 2) Restrict plugin access to trusted users and roles until an official patch is released. 3) Monitor web server and application logs for unusual access patterns or attempts to exploit the plugin. 4) Implement web application firewall (WAF) rules to block suspicious requests targeting the plugin endpoints. 5) Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 6) Consider temporarily disabling the plugin if it is not critical to operations or if the risk is deemed unacceptable. 7) Educate site administrators on the importance of least privilege principles and regularly review user permissions related to the plugin. 8) Employ security scanning tools specialized in WordPress plugin vulnerabilities to detect similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-03-12T11:11:04.188Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69b3fc712f860ef943d17a64
Added to database: 3/13/2026, 12:00:49 PM
Last enriched: 3/13/2026, 1:01:29 PM
Last updated: 3/15/2026, 12:36:09 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.