VYPR
Medium severity5.4NVD Advisory· Published Dec 9, 2024· Updated Apr 28, 2026

CVE-2023-50899

CVE-2023-50899

Description

Missing Authorization vulnerability in MultiVendorX Product Catalog Enquiry for WooCommerce by MultiVendorX allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Catalog Enquiry for WooCommerce by MultiVendorX: from n/a through 5.0.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Product Catalog Enquiry for WooCommerce ≤5.0.2 lets unauthenticated attackers exploit incorrectly configured access controls.

Vulnerability

Overview

The Product Catalog Enquiry for WooCommerce plugin by MultiVendorX, versions up to and including 5.0.2, suffers from a Missing Authorization vulnerability [1]. The plugin fails to properly validate access control checks in certain functions, allowing unauthorized users to execute actions reserved for higher-privileged roles. This flaw falls under the category of broken access control, a common issue in WordPress plugins where nonce or capability checks are omitted [1].

Exploitation

Method

An attacker can exploit this vulnerability without requiring authentication. By sending crafted requests to the WordPress site, an unauthenticated user can trigger privileged actions due to the missing authorization checks [1]. The CVSS score of 5.4 (Medium) reflects the ease of exploitation and the need for minimal privileges (none) but limited impact on confidentiality and integrity, as per the supplied reference.

Impact

Successful exploitation allows an unauthenticated attacker to perform actions that should require higher-level permissions, potentially leading to unauthorized data access or configuration changes [1]. The reference notes that such vulnerabilities are often used in mass-exploit campaigns targeting thousands of sites.

Mitigation

The plugin vendor has released version 5.0.3 which patches the issue [1]. Immediate update to the latest version is strongly recommended. For sites unable to update, temporary mitigation includes restricting access to the plugin's functionality via web application firewall rules or contacting the hosting provider for assistance. The advisory rates the severity as low likelihood of exploitation, but given the lack of authentication requirements, updating remains critical.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.