VYPR
Medium severity6.5NVD Advisory· Published Feb 17, 2026· Updated Apr 15, 2026

CVE-2024-31118

CVE-2024-31118

Description

Missing Authorization vulnerability in Smartypants SP Project & Document Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SP Project & Document Manager: from n/a through 4.70.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in SP Project & Document Manager (≤4.70) allows unprivileged users to trigger actions requiring higher privileges, potentially leading to XSS.

Vulnerability

Overview

CVE-2024-31118 is a missing authorization vulnerability in the WordPress plugin SP Project & Document Manager (versions n/a through 4.70). The plugin fails to properly enforce access control checks, allowing users with lower privileges to execute functions that should require higher-level permissions. This broken access control issue stems from missing authorization, authentication, or nonce token checks in certain plugin functions [1].

Exploitation

Exploitation requires a privileged user to perform an action, such as clicking a malicious link, visiting a crafted page, or submitting a form. The vulnerability can be initiated by a user with the role specified in the required privilege level, but successful exploitation depends on that user taking an additional action. This makes it a moderate-severity issue (CVSS 6.5) that is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of size or popularity [1].

Impact

An attacker who successfully exploits this vulnerability can trigger higher-privileged actions, potentially leading to cross-site scripting (XSS) or other unauthorized operations. The impact is amplified by the likelihood of automated exploitation in widespread campaigns [1].

Mitigation

As of the publication date, the vendor has not released an official patch. Users are advised to update the plugin immediately when a fix becomes available. If updating is not possible, users should contact their hosting provider or web developer for assistance. Patchstack has issued a mitigation rule to block attacks until an official patch can be tested and safely applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.