CVE-2026-40784
Received Received - Intake
Authorization Bypass in FluentBoards via User-Controlled Key

Publication date: 2026-04-15

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards fluent-boards allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentBoards: from n/a through <= 1.91.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mahmudul_hasan_arif fluent_boards to 1.91.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized users to bypass authorization and authentication controls, potentially accessing sensitive files, folders, or interacting improperly with the database. This kind of unauthorized access can lead to exposure or misuse of sensitive data.

Such unauthorized access and potential data exposure could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive personal and health information.

However, the provided information does not explicitly mention the direct impact on compliance with these standards.


Can you explain this vulnerability to me?

CVE-2026-40784 is an Insecure Direct Object References (IDOR) vulnerability in the WordPress FluentBoards Plugin versions up to 1.91.2.

This vulnerability allows unauthorized users, such as malicious actors with board member or developer privileges, to bypass authorization and authentication controls.

As a result, attackers can potentially access sensitive files, folders, or interact improperly with the database due to incorrectly configured access control security levels.

The issue is classified under the OWASP Top 10 category A1: Broken Access Control.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive data or resources within the FluentBoards plugin environment.

Attackers exploiting this flaw may gain improper access to files, folders, or database interactions, which could compromise the integrity and confidentiality of your data.

Although the CVSS score is high (8.1), indicating a severe issue, the likelihood of exploitation is considered low and the overall impact is limited according to Patchstack.

Users are strongly advised to update to version 1.91.3 or later to mitigate this risk.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability affects FluentBoards Plugin versions 1.91.2 and earlier and was patched in version 1.91.3, released on April 15, 2026.

Users are strongly advised to update to version 1.91.3 or later to mitigate the risk.

Patchstack offers automatic updates for vulnerable plugins to facilitate rapid mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart