VYPR
Medium severity4.3NVD Advisory· Published Dec 24, 2025· Updated Apr 28, 2026

CVE-2023-28619

CVE-2023-28619

Description

Missing Authorization vulnerability in bnayawpguy Resoto allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Resoto: from n/a through 1.0.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Resoto WordPress theme through version 1.0.8 contains a missing authorization vulnerability allowing authenticated attackers to activate arbitrary plugins.

The Resoto WordPress Resoto theme versions from n/a through 1.0.8 suffer from a missing authorization vulnerability. The issue stems from a broken access control mechanism, where the theme fails to properly verify user capabilities or nonce tokens before allowing plugin activation actions. This flaw enables authenticated users with lower privileges to perform actions that should be restricted to higher-privileged roles like administrators [1].

To exploit this vulnerability, an attacker must first have an authenticated session on the WordPress site, such as a subscriber or contributor account. No additional network position is required beyond standard web access. The attacker can then craft a request to activate any plugin installed on the site, bypassing the intended access control checks [1].

The impact of successful exploitation is that an attacker can enable arbitrary plugins, potentially including those with further security vulnerabilities or backdoor functionality. This could lead to site compromise, data theft, or defacement, depending on the capabilities of the activated plugin. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit in mass-exploit campaigns targeting thousands of sites [1].

As a mitigation, users should update the Resoto theme to a patched version beyond 1.0.8 immediately. If updating is not possible, site administrators should review and restrict user roles, or consult with their hosting provider for additional security measures [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.