VYPR
Medium severity6.5NVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2026-24957

CVE-2026-24957

Description

Missing Authorization vulnerability in WP Chill Strong Testimonials strong-testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through <= 3.2.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Strong Testimonials plugin for WordPress up to 3.2.20 has a missing authorization vulnerability allowing unprivileged users to perform higher privileged actions.

Vulnerability

Details The Strong Testimonials plugin for WordPress (versions up to and including 3.2.20) suffers from a missing authorization vulnerability. This broken access control issue means that the plugin fails to properly verify access rights for certain functions, allowing users with lower privileges to execute actions intended for higher-privileged users [1]. The root cause is the absence of adequate authorization checks, nonce validation, or authentication requirements in affected functionality.

Exploitation

Exploitation does not require any special network position; any user who can interact with the WordPress site (including unauthenticated visitors) may be able to exploit this flaw if the vulnerable endpoint is exposed. The attack surface is typical for WordPress plugins where user roles and capabilities are not consistently enforced. The vulnerability is classified as medium severity (CVSS 6.5) but is considered low risk for mass exploitation according to the vendor's assessment [1].

Impact

Successful exploitation can allow an attacker to gain unauthorized access to administrative or higher-privileged actions. This could include modifying plugin settings, altering testimonials, or accessing sensitive data. However, the vulnerability is rated as low likelihood of exploitation due to the need for specific conditions [1].

Mitigation

The vulnerability is patched in version 3.2.21 of the Strong Testimonials plugin. Users are strongly advised to update to the latest version immediately. For those unable to update, applying web application firewall rules or disabling the plugin may serve as temporary workarounds [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1