Authorization Bypass Through User-Controlled Key vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Miraculous Core Plugin: from n/a through < 2.0.9.
History

Mon, 17 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 06 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Miraculous Core Plugin: from n/a through < 2.0.9.
Title WordPress Miraculous Core Plugin plugin < 2.0.9 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published: 2025-11-06T15:54:23.943Z

Updated: 2025-11-17T16:32:24.640Z

Reserved: 2025-09-03T09:03:04.976Z

Link: CVE-2025-58627

cve-icon Vulnrichment

Updated: 2025-11-17T16:30:06.074Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-06T16:15:59.557

Modified: 2025-11-17T17:15:49.057

Link: CVE-2025-58627

cve-icon Redhat

No data.