CVE-2026-27397 PUBLISHED

WordPress Really Simple Security Pro plugin <= 9.5.4.0 - Insecure Direct Object References (IDOR) vulnerability

Assigner: Patchstack
Reserved: 19.02.2026 Published: 19.03.2026 Updated: 19.03.2026

Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVSS Score: 6.5

Product Status

Vendor Really Simple Plugins B.V.
Product Really Simple Security Pro
Versions Default: unaffected
  • affected from n/a to 9.5.4.0 (incl.)

Solutions

Update the WordPress Really Simple Security Pro plugin to the latest available version (at least 9.5.4.1).

Credits

  • dcodx | Patchstack Bug Bounty Program finder

References

Problem Types

  • CWE-639 Authorization Bypass Through User-Controlled Key CWE

Impacts

  • CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels