VYPR
Medium severity4.3NVD Advisory· Published Dec 16, 2025· Updated Apr 27, 2026

CVE-2025-59001

CVE-2025-59001

Description

Missing Authorization vulnerability in ThemeNectar Salient Core salient-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Salient Core: from n/a through <= 3.0.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Salient Core plugin (≤3.0.8) allows unprivileged users to exploit incorrectly configured access controls.

Vulnerability

Overview

The Salient Core plugin for WordPress, versions 3.0.8 and earlier, contains a missing authorization vulnerability. The issue stems from an incorrectly configured access control security level, which fails to properly enforce privilege checks on certain functions. This broken access control allows users without the necessary permissions to perform actions that should require higher privileges [1].

Exploitation

An attacker who does not have the required privileges can exploit this vulnerability by sending crafted requests to the affected plugin endpoints. The attack does not require authentication as an administrator, making it accessible to any authenticated user with minimal access to trigger the flaw. The vulnerability is classified as a broken access control issue, meaning the plugin lacks proper authorization checks or nonce token validation in its functions [1].

Impact

Successful exploitation enables an attacker to perform actions that should be restricted to higher-privileged users, such as administrators. This could include modifying plugin settings, accessing sensitive data, or executing other unauthorized operations within the WordPress installation. The CVSS v3 score of 4.3 (Medium) reflects the limited but real risk of privilege escalation [1].

Mitigation

Mitigation

The vendor has released version 3.0.9 which addresses the vulnerability. Users are strongly advised to update the Salient Core plugin to 3.0.9 or later immediately. For those unable to update, contacting the hosting provider or web developer for assistance is recommended. Patchstack users can enable auto-updates for vulnerable plugins to ensure timely patching [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.