VYPR
Medium severity5.3NVD Advisory· Published Apr 8, 2026· Updated Apr 24, 2026

CVE-2026-39673

CVE-2026-39673

Description

Missing Authorization vulnerability in shrikantkale iZooto izooto-web-push allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iZooto: from n/a through <= 3.7.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in iZooto WordPress plugin up to 3.7.20 allows unauthenticated attackers to exploit incorrectly configured access controls.

The iZooto WordPress plugin versions up to and including 3.7.20 contain a missing authorization vulnerability. The plugin fails to properly validate access control security levels, leaving certain functions exposed without adequate permission checks. This is a classic case of broken access control, where the software does not enforce the intended restrictions for authenticated versus unauthenticated users [1].

Exploitation of this vulnerability does not require authentication. Attackers can send crafted requests to the affected plugin's endpoints, bypassing the intended authorization checks. The attack surface is wide, as the plugin is installed on many WordPress sites, and the flaw can be leveraged without prior access or specific privileges [1].

Successful exploitation allows an attacker to perform actions that should be reserved for higher-privileged users. This could include modifying plugin settings, accessing sensitive configurations, or executing other unauthorized operations, depending on the specific functions that are missing authorization. The vulnerability is rated Medium (CVSS 5.3) due to the limited direct impact on confidentiality or integrity but is still concerning because of the ease of exploitation [1].

As a mitigation, site administrators should immediately update the iZooto plugin to a version newer than 3.7.20. If updating is not immediately possible, restricting access to the plugin's admin pages or seeking assistance from a hosting provider is recommended. No workaround is officially provided other than applying the patch [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.