Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32378: Missing Authorization in raratheme Book Landing Page

0
Medium
VulnerabilityCVE-2026-32378cvecve-2026-32378
Published: Fri Mar 13 2026 (03/13/2026, 11:42:08 UTC)
Source: CVE Database V5
Vendor/Project: raratheme
Product: Book Landing Page

Description

Missing Authorization vulnerability in raratheme Book Landing Page book-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Book Landing Page: from n/a through <= 1.2.7.

AI-Powered Analysis

AILast updated: 03/13/2026, 13:01:29 UTC

Technical Analysis

CVE-2026-32378 identifies a Missing Authorization vulnerability in the raratheme Book Landing Page plugin, specifically affecting versions up to and including 1.2.7. The vulnerability arises from incorrectly configured access control security levels, which means that the plugin fails to properly verify whether a user has the necessary permissions before granting access to certain resources or functionalities. This type of vulnerability is critical because it can allow unauthorized users to bypass intended restrictions, potentially exposing sensitive data or enabling unauthorized actions within the affected plugin's scope. The Book Landing Page plugin is typically used on WordPress sites to create and manage book-related landing pages, often involving customer interactions or content management. The lack of proper authorization checks can lead to confidentiality breaches or unauthorized modifications. Although no CVSS score has been assigned, the nature of the vulnerability suggests a significant security risk. No patches or fixes have been officially published at the time of this report, and no known exploits have been observed in the wild. The vulnerability was reserved and published in March 2026 by Patchstack, a known security vendor specializing in WordPress plugin vulnerabilities. Organizations using this plugin should monitor for updates and assess their exposure promptly.

Potential Impact

The impact of CVE-2026-32378 can be substantial for organizations using the affected Book Landing Page plugin. Unauthorized access due to missing authorization can lead to exposure of sensitive information, unauthorized content modification, or manipulation of user interactions on landing pages. This can damage organizational reputation, result in data breaches, and potentially facilitate further attacks if attackers leverage the unauthorized access to pivot within the network. Since the plugin is used in WordPress environments, which are widely deployed globally, the scope of affected systems is broad. The absence of authentication requirements for exploitation increases the risk, making it easier for attackers to exploit the vulnerability remotely. The integrity and confidentiality of data managed by the plugin are primarily at risk, while availability impact is likely limited unless attackers use the access to disrupt services. Organizations in sectors relying heavily on digital marketing, e-commerce, or publishing are particularly vulnerable due to the plugin’s typical use cases.

Mitigation Recommendations

To mitigate the risks posed by CVE-2026-32378, organizations should take the following specific actions: 1) Immediately audit the access control configurations of the Book Landing Page plugin to identify any unauthorized access paths. 2) Restrict plugin access to trusted users and roles until an official patch is released. 3) Monitor web server and application logs for unusual access patterns or attempts to exploit the plugin. 4) Implement web application firewall (WAF) rules to block suspicious requests targeting the plugin endpoints. 5) Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 6) Consider temporarily disabling the plugin if it is not critical to operations or if the risk is deemed unacceptable. 7) Educate site administrators on the importance of least privilege principles and regularly review user permissions related to the plugin. 8) Employ security scanning tools specialized in WordPress plugin vulnerabilities to detect similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-12T11:11:04.188Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3fc712f860ef943d17a64

Added to database: 3/13/2026, 12:00:49 PM

Last enriched: 3/13/2026, 1:01:29 PM

Last updated: 3/15/2026, 12:36:09 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses