CVE-2025-49236
BaseFortify
Publication date: 2025-06-06
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-49236 is a Broken Access Control vulnerability in the WordPress Raychat plugin (versions up to 2.1.0). It occurs due to missing authorization, authentication, or nonce token checks in certain functions, allowing unauthenticated users to perform actions that should be restricted to higher-privileged users. [1]
How can this vulnerability impact me? :
This vulnerability allows unauthenticated users to perform actions reserved for privileged users, potentially leading to unauthorized changes or misuse of the plugin's functionality. However, its impact is considered low severity with a CVSS score of 5.3 and is unlikely to be widely exploited. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Raychat plugin to version 2.2.0 or later, as this version contains the fix. Additionally, consider applying Patchstack's virtual patching (vPatching) solution for rapid protection before official patches are applied. Keep all plugins updated regularly and seek professional incident response if you suspect your site has been compromised. [1]