CVE-2026-39690
Received Received - Intake
Missing Authorization in Paul Bearne Author Avatars List

Publication date: 2026-04-08

Last updated on: 2026-04-08

Assigner: Patchstack

Description
Missing Authorization vulnerability in Paul Bearne Author Avatars List/Block author-avatars allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Author Avatars List/Block: from n/a through <= 2.1.25.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
paul_bearne author_avatars_list_block to 2.1.25 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39690 is a broken access control vulnerability in the WordPress Author Avatars List/Block plugin versions up to and including 2.1.25.

The issue arises from missing authorization, authentication, or nonce token checks in certain plugin functions, which allows unauthenticated users to perform actions that normally require higher privileges.

This vulnerability falls under the OWASP Top 10 category A1: Broken Access Control.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a broken access control issue that allows unauthenticated users to perform actions requiring higher privileges. Such unauthorized access could potentially lead to exposure or manipulation of sensitive data.

While the provided information does not explicitly mention compliance with standards like GDPR or HIPAA, broken access control vulnerabilities generally pose risks to data confidentiality and integrity, which are critical components of these regulations.

Therefore, if exploited, this vulnerability could negatively impact compliance with regulations that mandate strict access controls and protection of personal or sensitive information.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow attackers to perform unauthorized actions on websites using the affected plugin, potentially compromising site integrity.

Although the CVSS severity score is 5.3, indicating a low priority threat with limited impact, attackers might use this flaw in mass-exploit campaigns targeting many websites regardless of their traffic or popularity.

Immediate mitigation involves updating the affected plugin or seeking assistance from hosting providers or web developers.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability arises from missing authorization, authentication, or nonce token checks in certain plugin functions of the WordPress Author Avatars List/Block plugin up to version 2.1.25.

Detection would involve checking the installed version of the Author Avatars List/Block plugin on your WordPress site to see if it is version 2.1.25 or earlier.

You can use WordPress CLI commands to check the plugin version, for example:

  • wp plugin list --status=active
  • Look for the 'author-avatars' plugin and verify its version.

Additionally, monitoring for unauthorized actions or access attempts related to author avatar management functions could indicate exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the affected Author Avatars List/Block plugin to a version newer than 2.1.25 if such an update becomes available.

Since no official patch is currently available, if updating is not possible, users are advised to seek assistance from their hosting provider or web developer to implement custom access control measures.

Using security services such as Patchstack's rapid vulnerability mitigation may also help reduce risk.

In general, restricting access to plugin management areas and monitoring for suspicious activity can help mitigate exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart