VYPR
Medium severity5.3NVD Advisory· Published Apr 29, 2026· Updated Apr 29, 2026

CVE-2026-42642

CVE-2026-42642

Description

Missing Authorization vulnerability in StellarWP GiveWP give allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GiveWP: from n/a through <= 4.14.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in GiveWP plugin (≤4.14.5) allows unprivileged users to exploit incorrectly configured access controls.

The vulnerability is a missing authorization issue in the GiveWP plugin for WordPress, affecting versions up to and including 4.14.5. The plugin fails to properly enforce access control checks, allowing exploitation of incorrectly configured security levels [1].

Attackers can exploit this by sending crafted requests to plugin functions that lack proper authorization checks. While the exact prerequisites are not detailed, the issue is classified as a broken access control vulnerability that could allow an unprivileged user to execute higher-privileged actions [1].

The impact is considered low severity by the vendor, but such vulnerabilities are known to be used in mass-exploit campaigns targeting thousands of websites. An attacker could potentially gain unauthorized access to sensitive functions, leading to data exposure or privilege escalation [1].

The issue is patched in version 4.14.6. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. No workaround is available [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.