CVE-2025-49991
Description
Missing Authorization vulnerability in tggfref WP-Recall allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WP-Recall: from n/a through 16.26.14.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WP-Recall plugin versions up to 16.26.14 have a missing authorization vulnerability allowing unauthenticated access to restricted functionality.
The WP-Recall plugin for WordPress suffers from a missing authorization vulnerability in versions from n/a through 16.26.14. This flaw allows attackers to access functionality that should be constrained by Access Control Lists (ACLs), effectively bypassing access controls [1].
Exploitation does not require authentication, as the missing authorization check means any unauthenticated user can trigger the vulnerable functions. The attack surface is broad because the plugin is widely used, and the vulnerability can be exploited remotely over HTTP. No special network position is needed; an attacker only needs to send crafted requests to the WordPress site [1].
The impact is that an attacker can access restricted functionality, potentially leading to unauthorized actions such as viewing sensitive data, modifying settings, or performing other privileged operations. The CVSS score of 5.3 (Medium) reflects the potential for partial compromise without authentication [1].
As of the publication date, no patch has been released; users are advised to update the plugin if a fix becomes available. Given that such vulnerabilities are used in mass-exploit campaigns, immediate action is recommended, such as disabling the plugin or applying a web application firewall rule [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.