CVE-2025-58627
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-11-06
Last updated on: 2025-11-17
Assigner: Patchstack
Description
Description
Authorization Bypass Through User-Controlled Key vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Miraculous Core Plugin: from n/a through < 2.0.9.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kamleshyadav | miraculous_core_plugin | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Authorization Bypass Through User-Controlled Key in the Miraculous Core Plugin by kamleshyadav. It allows attackers to exploit incorrectly configured access control security levels, potentially bypassing authorization mechanisms in versions before 2.0.9.
How can this vulnerability impact me? :
This vulnerability can allow unauthorized users to bypass access controls, potentially gaining access to restricted functionality or data within the affected plugin, which could lead to security breaches or unauthorized actions.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70