VYPR
Medium severity6.5NVD Advisory· Published Feb 20, 2026· Updated Apr 27, 2026

CVE-2025-68564

CVE-2025-68564

Description

Missing Authorization vulnerability in sendy Sendy sendy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sendy: from n/a through <= 3.4.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Sendy plugin for WordPress (≤3.4.2 and below allows unauthenticated privilege escalation via broken access control.

Vulnerability

Overview

The Sendy plugin for WordPress versions 3.4.2 and earlier contains a missing authorization vulnerability (CWE-862) that allows an attacker to exploit incorrectly configured access control security levels. The plugin fails to properly verify nonce tokens or user capabilities before executing certain privileged actions, enabling unauthenticated users to perform operations intended for higher-privileged roles [1].

Exploitation

Details

This broken access control issue can be exploited remotely without authentication. Attackers can target thousands of websites running the vulnerable plugin by sending crafted requests that bypass authorization checks. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns, where attackers target thousands of sites regardless of traffic size or popularity [1].

Impact

Successful exploitation allows an unprivileged attacker to execute higher-privileged actions within the WordPress installation, potentially leading to unauthorized data access, site defacement, or further compromise. The CVSS v3 base score of 6.5 reflects the medium severity of this vulnerability [1].

Mitigation

The vendor has released version 3.4.3 which resolves the vulnerability. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a mitigation rule to block attacks until the patch is applied. Hosting providers or web developers can assist with the update process [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.