VYPR
Medium severity5.4NVD Advisory· Published Feb 24, 2025· Updated Apr 23, 2026

CVE-2025-27356

CVE-2025-27356

Description

Missing Authorization vulnerability in Hardik Sticky Header On Scroll sticky-header-on-scroll allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sticky Header On Scroll: from n/a through <= 1.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Sticky Header On Scroll plugin for WordPress allows unprivileged users to exploit incorrectly configured access controls.

Vulnerability

Overview The Sticky Header On Scroll plugin for WordPress (versions up to 1.0) suffers from a missing authorization vulnerability. Specifically, the plugin fails to properly check user permissions or nonce tokens before executing certain functions, meaning an unauthenticated or low-privileged user can perform actions intended only for higher-privileged users [1].

Exploitation

This vulnerability is categorized as a broken access control issue. An attacker does not need any special authentication to exploit this flaw; they can simply send crafted requests to the affected plugin endpoints. Because the plugin lacks proper access control checks, an attacker can trigger functionality that should be restricted to administrators, such as modifying plugin settings or other actions [1].

Impact

Successful exploitation allows an attacker to bypass security restrictions and execute privileged operations without authorization. This can lead to unauthorized changes in the plugin's configuration, potentially affecting the website's appearance or functionality. In mass-exploit campaigns, attackers can target thousands of websites simultaneously, regardless of their size or popularity [1].

Mitigation

The vendor has not released a patched version as the plugin is limited to version 1.0. Users are strongly advised to update the plugin immediately if a newer version becomes available. If updating is not possible, users should seek assistance from their hosting provider or a web developer to apply appropriate workarounds or remove the plugin until a fix is released [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.