CVE-2023-32094
Description
Missing Authorization vulnerability in Felix Welberg Extended Post Status allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Extended Post Status: from n/a through 1.0.19.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing authorization in WordPress Extended Post Status plugin up to 1.0.19 allows unauthenticated attackers to exploit access control flaws.
Vulnerability
Overview
The Extended Post Status plugin for WordPress, versions prior to 1.0.20, contains a missing authorization vulnerability. This flaw stems from the plugin's failure to properly verify access control checks when processing certain requests, allowing attackers to bypass intended security restrictions [1]. The issue is classified as a broken access control vulnerability, which can be exploited to perform actions that should require higher privileges.
Exploitation
Details
An attacker can exploit this vulnerability without needing any prior authentication, as the missing authorization check leaves the affected functions exposed. By sending specially crafted HTTP requests to the WordPress site, an unauthenticated user can trigger unauthorized operations that the plugin normally restricts to higher-privileged roles [1]. The attack surface is broad because the plugin is widely used, and the vulnerability can be chained with other weaknesses in mass-exploit campaigns.
Impact
Successful exploitation allows an attacker to manipulate post statuses or perform other administrative actions that should be protected. This could lead to unauthorized content modifications, privilege escalation, or further compromise of the WordPress site. The CVSS score of 5.4 (Medium) reflects the potential for significant disruption, though the vulnerability is considered low severity in isolation [1].
Mitigation
The vendor has released version 1.0.20, which addresses the missing authorization issue. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a virtual patching rule to block exploitation attempts until the update can be applied [1]. Given the plugin's use in mass-exploit campaigns, timely remediation is critical.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.0.19
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.