VYPR
Medium severity4.3NVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2026-24985

CVE-2026-24985

Description

Missing Authorization vulnerability in approveme WP Forms Signature Contract Add-On wp-forms-signature-contract-add-on allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Forms Signature Contract Add-On: from n/a through <= 1.8.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in WP Forms Signature Contract Add-On ≤1.8.2 allows unauthenticated users to dismiss notices, a privilege they should not have.

Vulnerability

Overview The WP Forms Signature Contract Add-On plugin for WordPress, versions <= 1.8.2, suffers from a missing authorization vulnerability. The root cause is a broken access control issue where a function responsible for dismissing notices lacks proper authorization or capability checks [1]. This allows any unauthenticated user to execute an action intended only for higher-privileged roles [1].

Attack

Vector An attacker can exploit this vulnerability by sending a crafted request to the plugin's notice dismissal endpoint. No authentication is required, and the attack can be performed remotely over HTTP [1]. The low complexity and no privilege requirement make it easy to perform at scale.

Impact

Successful exploitation allows an attacker to dismiss (hide) notices that are displayed by the plugin. While this does not lead to data theft or full site compromise, it can be used to suppress security warnings or other important notifications that site administrators rely on [1]. This manipulation of the user interface could contribute to reducing the visibility of security-relevant information.

Mitigation

The vulnerability has been fixed in version 1.8.3 of the plugin [1]. Users are strongly advised to update immediately. For those who cannot update, consulting with a hosting provider or web developer is recommended [1]. The plugin vendor has acknowledged the issue, and auto-update features can be utilized where available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.