VYPR
Medium severity5.3NVD Advisory· Published Dec 16, 2025· Updated Apr 27, 2026

CVE-2025-66122

CVE-2025-66122

Description

Missing Authorization vulnerability in Design Stylish Price List stylish-price-list allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stylish Price List: from n/a through <= 7.2.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stylish Price List plugin ≤ 7.2.2 has a missing authorization vulnerability allowing unprivileged users to execute privileged actions without proper access control checks.

Vulnerability

Overview The Stylish Price List WordPress plugin, versions up to and including 7.2.2, suffers from a Missing Authorization vulnerability. This is a broken access control issue where the plugin fails to properly enforce authorization, authentication, or nonce token checks in certain functions. Consequently, an unprivileged user can execute actions that should require higher privileges without proper permission validation [1].

## Exploitation & Attack Surface To exploit this vulnerability, an attacker needs network access to a WordPress site running the affected plugin version. Since the plugin omits necessary access control checks, no special user roles or authentication beyond basic server access may be required. The issue is classified as a "Broken Access Control" type, which can allow unauthenticated or lower-privileged users to perform privileged operations [1].

Impact

An attacker who successfully exploits this vulnerability can bypass intended security levels and perform actions that are normally restricted, such as modifying settings or accessing sensitive data. The CVSS score of 5.3 (Medium) reflects the moderate but real risk of unauthorized data exposure or functionality misuse [1].

Mitigation

Status The vulnerability has been addressed in version 7.2.3 of the plugin. The primary remediation is to update to 7.2.3 or later. For sites where immediate update is not possible, enabling auto-updates via Patchstack or contacting a hosting provider for assistance is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.