CVE-2026-5347: CWE-862 Missing Authorization in mhmrajib WP Books Gallery – Build Stunning Book Showcases & Libraries in Minutes
The WP Books Gallery WordPress plugin up to version 4. 8. 0 has a missing authorization vulnerability. It lacks proper capability checks and nonce verification when updating permalink settings, allowing unauthenticated attackers to modify the custom post type slug. This can disrupt URL structures for book entries, potentially breaking links and affecting SEO. The vulnerability has a medium severity with a CVSS score of 5. 3. No official patch or remediation guidance is currently available from the vendor.
AI Analysis
Technical Summary
CVE-2026-5347 describes a missing authorization vulnerability (CWE-862) in the WP Books Gallery plugin for WordPress, versions up to 4.8.0. The issue arises because the admin_init hook handling permalink settings updates does not verify user capabilities or nonce tokens, only checking for the presence of a 'permalink_structure' POST parameter. This allows unauthenticated attackers to change the 'wbg_cpt_slug' option, altering the URL structure for book entries. Such unauthorized changes can break existing links and negatively impact SEO rankings. The CVSS 3.1 base score is 5.3, reflecting a network attack vector with no privileges required and no user interaction needed, causing integrity impact but no confidentiality or availability impact. There is no vendor advisory or patch information available at this time.
Potential Impact
An unauthenticated attacker can modify the custom post type slug for the books gallery, changing the URL structure of all book entries. This can break existing links and harm SEO rankings. There is no direct confidentiality or availability impact reported. The integrity of the URL structure is compromised, which may affect website functionality and user experience.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, administrators should consider restricting access to the affected plugin's settings and monitor for unauthorized changes. Applying general WordPress security best practices may help reduce risk but will not fully mitigate this specific vulnerability.
CVE-2026-5347: CWE-862 Missing Authorization in mhmrajib WP Books Gallery – Build Stunning Book Showcases & Libraries in Minutes
Description
The WP Books Gallery WordPress plugin up to version 4. 8. 0 has a missing authorization vulnerability. It lacks proper capability checks and nonce verification when updating permalink settings, allowing unauthenticated attackers to modify the custom post type slug. This can disrupt URL structures for book entries, potentially breaking links and affecting SEO. The vulnerability has a medium severity with a CVSS score of 5. 3. No official patch or remediation guidance is currently available from the vendor.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5347 describes a missing authorization vulnerability (CWE-862) in the WP Books Gallery plugin for WordPress, versions up to 4.8.0. The issue arises because the admin_init hook handling permalink settings updates does not verify user capabilities or nonce tokens, only checking for the presence of a 'permalink_structure' POST parameter. This allows unauthenticated attackers to change the 'wbg_cpt_slug' option, altering the URL structure for book entries. Such unauthorized changes can break existing links and negatively impact SEO rankings. The CVSS 3.1 base score is 5.3, reflecting a network attack vector with no privileges required and no user interaction needed, causing integrity impact but no confidentiality or availability impact. There is no vendor advisory or patch information available at this time.
Potential Impact
An unauthenticated attacker can modify the custom post type slug for the books gallery, changing the URL structure of all book entries. This can break existing links and harm SEO rankings. There is no direct confidentiality or availability impact reported. The integrity of the URL structure is compromised, which may affect website functionality and user experience.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, administrators should consider restricting access to the affected plugin's settings and monitor for unauthorized changes. Applying general WordPress security best practices may help reduce risk but will not fully mitigate this specific vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-04-01T16:35:44.962Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69eb095d87115cfb68f0d938
Added to database: 4/24/2026, 6:10:37 AM
Last enriched: 4/24/2026, 6:21:25 AM
Last updated: 4/24/2026, 8:55:12 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.