CVE-2026-0674
Description
Missing Authorization vulnerability in Campaign Monitor Campaign Monitor for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.
This issue affects Campaign Monitor for WordPress: from n/a through 2.9.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Campaign Monitor for WordPress plugin ≤2.9.1 has a missing authorization vulnerability allowing unprivileged users to exploit incorrectly configured access controls.
Vulnerability
Overview The Campaign Monitor for WordPress plugin, versions from n/a through version 2.9.1 contains a missing authorization vulnerability. This broken access control issue means that certain functions lack proper authorization, authentication, or nonce token checks, potentially allowing an unprivileged user to execute higher-privileged actions [1].
Exploitation
An attacker who is already an authenticated user with low privileges could exploit this flaw by sending crafted requests to the vulnerable endpoints. No special network position is required beyond standard web access to the WordPress site. The vulnerability is classified as medium severity with a CVSS v3 score of 4.3.9 (though the provided CVSS is 4.3, the reference notes the score is not ideal for WordPress) [1].
Impact
Successful exploitation could allow an attacker to perform actions that should be restricted to higher-privileged users, such as modifying plugin settings or accessing sensitive data. While the impact is considered low severity and exploitation is considered unlikely, the vulnerability is noted as being used in mass-exploit campaigns targeting thousands of websites [1].
Mitigation
The vendor has released version 2.9.2 which resolves the vulnerability. Users are strongly advised to update immediately. For Patchstack users, auto-updates can be enabled for vulnerable plugins will provide protection. If updating is not possible, contacting a hosting provider or web developer for assistance is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.9.1
- Range: <=2.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.