VYPR
Medium severity5.4NVD Advisory· Published Sep 22, 2025· Updated Apr 23, 2026

CVE-2025-58660

CVE-2025-58660

Description

Missing Authorization vulnerability in brandexponents Oshine Core oshine-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Oshine Core: from n/a through <= 1.5.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization vulnerability in Oshine Core WordPress plugin (<=1.5.5) allows attackers to exploit incorrectly configured access controls, enabling privilege escalation or unauthorized actions.

Vulnerability

Overview The Oshine Core plugin for WordPress, versions up to and including 1.5.5, suffers from a missing authorization vulnerability. This flaw stems from incorrect configuration of access control security levels, meaning that certain functions or endpoints lack proper authorization checks. As a result, the plugin fails to verify whether a user has the necessary permissions to perform sensitive actions.

Attack

Vector and Exploitation The vulnerability is classified as Broken Access Control (CWE-862), which can be exploited by attackers without needing prior authentication in some cases, or by low-privileged users such as subscribers. An attacker positioned on the same network or remotely can send crafted requests to the affected plugin's endpoints, bypassing security checks. The attack does not require any special conditions beyond the ability to interact with the WordPress site where the plugin is installed.

Impact

Successful exploitation allows an attacker to perform actions that should be restricted to higher-privileged users, such as administrators. This could include modifying settings, accessing sensitive data, or escalating privileges within the WordPress environment. The vulnerability has been used in mass-exploit campaigns, targeting thousands of websites regardless of their traffic size, making it a critical risk for site owners who have not updated.

Mitigation

Steps Users are strongly advised to update the Oshine Core plugin to a patched version as soon as possible. If immediate updating is not feasible, contacting the hosting provider or a web developer for assistance is recommended. No workarounds other than updating have been disclosed at this time. The vulnerability was publicly reported via Patchstack [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.