CVE-2025-58660
Description
Missing Authorization vulnerability in brandexponents Oshine Core oshine-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Oshine Core: from n/a through <= 1.5.5.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing authorization vulnerability in Oshine Core WordPress plugin (<=1.5.5) allows attackers to exploit incorrectly configured access controls, enabling privilege escalation or unauthorized actions.
Vulnerability
Overview The Oshine Core plugin for WordPress, versions up to and including 1.5.5, suffers from a missing authorization vulnerability. This flaw stems from incorrect configuration of access control security levels, meaning that certain functions or endpoints lack proper authorization checks. As a result, the plugin fails to verify whether a user has the necessary permissions to perform sensitive actions.
Attack
Vector and Exploitation The vulnerability is classified as Broken Access Control (CWE-862), which can be exploited by attackers without needing prior authentication in some cases, or by low-privileged users such as subscribers. An attacker positioned on the same network or remotely can send crafted requests to the affected plugin's endpoints, bypassing security checks. The attack does not require any special conditions beyond the ability to interact with the WordPress site where the plugin is installed.
Impact
Successful exploitation allows an attacker to perform actions that should be restricted to higher-privileged users, such as administrators. This could include modifying settings, accessing sensitive data, or escalating privileges within the WordPress environment. The vulnerability has been used in mass-exploit campaigns, targeting thousands of websites regardless of their traffic size, making it a critical risk for site owners who have not updated.
Mitigation
Steps Users are strongly advised to update the Oshine Core plugin to a patched version as soon as possible. If immediate updating is not feasible, contacting the hosting provider or a web developer for assistance is recommended. No workarounds other than updating have been disclosed at this time. The vulnerability was publicly reported via Patchstack [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.5.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.