CVE-2026-39672
Missing Authorization in ShipTime Discounted Shipping Plugin
Publication date: 2026-04-08
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| shiptime | discounted_shipping_rates | to 1.1.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-39672 is a Broken Access Control vulnerability in the WordPress plugin "ShipTime: Discounted Shipping Rates" versions up to and including 1.1.1.
The issue arises from missing authorization, authentication, or nonce token checks within certain plugin functions, which allows unauthenticated users to perform actions that normally require higher privileges.
This vulnerability falls under the OWASP Top 10 category A1: Broken Access Control.
How can this vulnerability impact me? :
This vulnerability allows unauthorized users to perform privileged actions within the affected plugin, potentially leading to unauthorized changes or access related to discounted shipping rates.
Although the CVSS severity score is 5.3, indicating a low severity impact, such vulnerabilities are commonly exploited in mass campaigns targeting many websites.
No official patch is currently available, so immediate mitigation involves updating the plugin or seeking assistance from hosting providers or web developers.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
CVE-2026-39672 is a Broken Access Control vulnerability in the ShipTime: Discounted Shipping Rates WordPress plugin that allows unauthenticated users to perform privileged actions due to missing authorization checks.
There is no specific detection method or commands provided in the available resources to identify exploitation attempts or presence of this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the affected ShipTime: Discounted Shipping Rates plugin to a fixed version if available.
Since no official patch is currently available for this vulnerability, if updating is not possible, users are advised to seek assistance from their hosting provider or web developer to implement temporary protections.