Access Control Vulnerability in MagePeople WpTravelly Plugin
CVE-2025-22737

5.3MEDIUM

Key Information:

Vendor
WordPress
Vendor
CVE Published:
15 January 2025

Summary

The MagePeople WpTravelly plugin is affected by a missing authorization vulnerability that allows unauthorized users to access functionality that is not properly constrained by Access Control Lists (ACLs). This issue compromises the security framework of the plugin, potentially leading to unauthorized actions within the WpTravelly service. Affected versions include all prior to 1.8.5, making it imperative for users to update to the latest version to mitigate risks associated with unprotected access.

Affected Version(s)

WpTravelly <= 1.8.5

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

thiennv (Patchstack Alliance)
.