Project Subscriptions
No advisories yet.
Solution
Update the WordPress Really Simple Security Pro plugin to the latest available version (at least 9.5.4.1).
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Really-simple-plugins
Really-simple-plugins really Simple Security Wordpress Wordpress wordpress |
|
| Vendors & Products |
Really-simple-plugins
Really-simple-plugins really Simple Security Wordpress Wordpress wordpress |
Thu, 19 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0. | |
| Title | WordPress Really Simple Security Pro plugin <= 9.5.4.0 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-03-19T13:45:55.021Z
Reserved: 2026-02-19T09:52:08.214Z
Link: CVE-2026-27397
Updated: 2026-03-19T13:45:51.559Z
Status : Awaiting Analysis
Published: 2026-03-19T06:16:25.410
Modified: 2026-03-19T13:25:00.570
Link: CVE-2026-27397
No data.
OpenCVE Enrichment
Updated: 2026-03-19T08:54:35Z