CVE-2026-4117
Received Received - Intake
Missing Authorization in CalJ WordPress Plugin Allows API Key Manipulation

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: Wordfence

Description
The CalJ plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.5. This is due to a missing capability check in the CalJSettingsPage class constructor, which processes the 'save-obtained-key' operation directly from POST data without verifying that the requesting user has the 'manage_options' capability, and without any nonce verification. The plugin bootstrap file (calj.php) instantiates CalJSettingsPage whenever is_admin() returns true, which is the case for any authenticated user making requests to wp-admin URLs (including admin-ajax.php). This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's API key setting and clear the Shabbat cache, effectively taking control of the plugin's API integration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-06
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
calj calj to 1.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The CalJ plugin for WordPress has a vulnerability called Missing Authorization in all versions up to and including 1.5. This happens because the plugin does not check if the user has the proper permissions before processing certain operations. Specifically, the CalJSettingsPage class constructor processes the 'save-obtained-key' operation directly from POST data without verifying that the user has the 'manage_options' capability or any nonce verification.

Since the plugin initializes this settings page for any authenticated user accessing admin URLs, even users with low-level access like Subscribers can exploit this flaw. They can modify the plugin's API key setting and clear the Shabbat cache, effectively taking control of the plugin's API integration.


How can this vulnerability impact me? :

This vulnerability allows authenticated users with low-level access (Subscriber and above) to modify critical plugin settings without proper authorization. They can change the API key used by the plugin and clear its cache, which could disrupt the plugin's functionality or allow attackers to hijack the plugin's API integration.

Such unauthorized changes could lead to loss of control over plugin behavior, potential data manipulation, or service disruption within the WordPress site.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart