VYPR
Medium severity6.5NVD Advisory· Published Jan 23, 2026· Updated Apr 15, 2026

CVE-2026-24585

CVE-2026-24585

Description

Missing Authorization vulnerability in Hyyan Abo Fakher Hyyan WooCommerce Polylang Integration woo-poly-integration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hyyan WooCommerce Polylang Integration: from n/a through <= 1.5.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated broken access control vulnerability in the Hyyan WooCommerce Polylang Integration plugin for WordPress allows attackers to escalate privileges.

Vulnerability

Overview

The Hyyan WooCommerce Polylang Integration plugin (slug: woo-poly-integration) for WordPress is affected by a missing authorization vulnerability affecting all versions up to and including 1.5.0. The issue arises from incorrectly configured access control security levels, allowing unauthenticated attackers to exploit broken access control mechanisms [1].

Attack

Vector

To exploit this vulnerability, an attacker does not need any authentication or special privileges. The attack can be carried out over the network by sending crafted requests to the WordPress site. The plugin fails to properly verify user permissions before granting access to certain administrative actions, enabling privilege escalation [1].

Impact

A successful exploit allows an attacker to bypass access controls and perform actions reserved for higher-privileged users, such as administrators. This could include modifying site settings, injecting malicious content, or taking over the site entirely. The CVSS score is 6.5 (Medium), and vulnerabilities of this type are frequently used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Mitigation

The vulnerability has been patched in version 1.5.1 of the plugin. Users are strongly urged to update immediately. If updating is not possible, administrators should consult their hosting provider or a web developer to implement additional access control measures or restrict plugin functionality until the update can be applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.