CVE-2026-22406
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Overton overton allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Overton: from n/a through <= 1.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mikado-themes overton From 1.0 (inc) to 1.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Authorization Bypass Through User-Controlled Key in Mikado-Themes Overton. It allows attackers to exploit incorrectly configured access control security levels, potentially bypassing authorization mechanisms.


How can this vulnerability impact me? :

This vulnerability can allow unauthorized users to bypass access controls, potentially gaining access to restricted areas or functions within the affected application, leading to unauthorized actions or data exposure.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is an Insecure Direct Object References (IDOR) issue in the WordPress Overton Theme up to version 1.3, allowing authorization bypass. Detection involves monitoring for unauthorized access attempts to sensitive files, folders, or database interactions via the theme. Since no official fix or detection commands are provided, you can check the theme version installed on your WordPress site by running commands like 'wp theme list' using WP-CLI to identify if Overton version 1.3 or below is in use. Additionally, reviewing web server logs for suspicious access patterns targeting Overton theme resources may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the Overton theme by limiting user roles to trusted users only, especially since exploitation requires at least subscriber or developer privileges. Monitor and audit user activities related to the theme. Since no official patch or fix is available, consider disabling or replacing the Overton theme until a fix is released. Employ general WordPress security best practices such as strong authentication, least privilege principles, and regular backups. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart