CVE-2026-40784
Authorization Bypass in FluentBoards via User-Controlled Key
Publication date: 2026-04-15
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mahmudul_hasan_arif | fluent_boards | to 1.91.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized users to bypass authorization and authentication controls, potentially accessing sensitive files, folders, or interacting improperly with the database. This kind of unauthorized access can lead to exposure or misuse of sensitive data.
Such unauthorized access and potential data exposure could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive personal and health information.
However, the provided information does not explicitly mention the direct impact on compliance with these standards.
Can you explain this vulnerability to me?
CVE-2026-40784 is an Insecure Direct Object References (IDOR) vulnerability in the WordPress FluentBoards Plugin versions up to 1.91.2.
This vulnerability allows unauthorized users, such as malicious actors with board member or developer privileges, to bypass authorization and authentication controls.
As a result, attackers can potentially access sensitive files, folders, or interact improperly with the database due to incorrectly configured access control security levels.
The issue is classified under the OWASP Top 10 category A1: Broken Access Control.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to sensitive data or resources within the FluentBoards plugin environment.
Attackers exploiting this flaw may gain improper access to files, folders, or database interactions, which could compromise the integrity and confidentiality of your data.
Although the CVSS score is high (8.1), indicating a severe issue, the likelihood of exploitation is considered low and the overall impact is limited according to Patchstack.
Users are strongly advised to update to version 1.91.3 or later to mitigate this risk.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability affects FluentBoards Plugin versions 1.91.2 and earlier and was patched in version 1.91.3, released on April 15, 2026.
Users are strongly advised to update to version 1.91.3 or later to mitigate the risk.
Patchstack offers automatic updates for vulnerable plugins to facilitate rapid mitigation.