VYPR
Medium severity5.3NVD Advisory· Published Mar 13, 2026· Updated Apr 29, 2026

CVE-2026-32383

CVE-2026-32383

Description

Missing Authorization vulnerability in raratheme Ridhi ridhi allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ridhi: from n/a through <= 1.1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Ridhi WordPress theme up to version 1.1.2 has a missing authorization vulnerability allowing unauthenticated attackers to exploit broken access controls.

The Ridhi WordPress theme, developed by raratheme, contains a Missing Authorization vulnerability up to version 1.1.2. This flaw stems from incorrectly configured access control security levels, specifically missing nonce or capability checks in certain functions. [1]

Exploitation does not require authentication, positioning it as an unauthenticated attack vector. This vulnerability is part of a pattern of broken access control issues commonly used in mass-exploit campaigns, which target thousands of websites indiscriminately. [1]

An attacker exploiting this vulnerability can perform unauthorized actions normally restricted to higher-privileged users, such as modifying theme settings or escalating privileges. The CVSS score of 5.3 reflects the medium severity, but exploitation in mass campaigns amplifies the real-world impact. [1]

Users are strongly advised to update the theme to the latest patched version. If immediate updating is not possible, consulting with a hosting provider or web developer for mitigation steps is recommended. No workaround details are provided beyond updating. [1]

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.