CVE-2025-66085
Description
Missing Authorization vulnerability in tychesoftwares Arconix Shortcodes arconix-shortcodes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Arconix Shortcodes: from n/a through <= 2.1.18.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Arconix Shortcodes WordPress plugin ≤2.1.18 lacks authorization checks, allowing attackers to exploit incorrectly configured access controls.
The Arconix Shortcodes plugin for WordPress (versions up to and including 2.1.18) contains a missing authorization vulnerability. This flaw stems from the plugin's failure to properly validate access control security levels, enabling unauthenticated or low-privileged users to execute actions that should require higher privileges [1].
The attack surface is broad as the vulnerability can be exploited without authentication. An attacker can send crafted requests to the affected plugin endpoints, bypassing intended access restrictions. The prerequisite is that the plugin is installed and active on a WordPress site; no special network position is required [1].
Successful exploitation allows an attacker to perform unauthorized actions, such as modifying shortcode configurations or accessing protected functionality. This could lead to content manipulation or information disclosure, depending on the plugin's features [1].
The vulnerability has been addressed in version 2.1.19. Users are strongly advised to update to this version or enable automatic updates for vulnerable plugins. Patchstack's advisory notes that while the severity is medium, the issue could be used in mass-exploit campaigns [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <= 2.1.18
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.