CVE-2026-32331
Missing Authorization in Israpil Textmetrics β€ 3.6.4 Enables Unauthorized Access
Publication date: 2026-03-13
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| textmetrics | webtexttool | 3.6.5 |
| textmetrics | webtexttool | to 3.6.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-32331 is a Broken Access Control vulnerability in the WordPress Textmetrics Plugin versions up to and including 3.6.4. It occurs due to missing authorization, authentication, or nonce token checks within certain plugin functions. This flaw allows users with only subscriber-level privileges to perform actions that should be restricted to higher-privileged roles.
The vulnerability falls under the OWASP Top 10 category A1: Broken Access Control and has a low severity impact with a CVSS score of 5.4. It was reported in early 2026 and has been fixed in version 3.6.5 of the plugin.
How can this vulnerability impact me? :
This vulnerability allows users with minimal privileges (subscriber-level) to perform actions that should be restricted to higher-privileged users. This could lead to unauthorized changes or access within the Textmetrics plugin environment.
However, the vulnerability is considered unlikely to be exploited and poses no significant threat. The overall impact is rated as low severity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate the vulnerability in the WordPress Textmetrics Plugin, you should update the plugin to version 3.6.5 or later, where the issue is resolved.'}, {'type': 'paragraph', 'content': "Additionally, consider using mitigation services such as Patchstack's auto-updates for vulnerable plugins to ensure timely patching."}] [1]