Permalink
CVE-2026-22393
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
WordPress Curly theme <= 3.3 - Insecure Direct Object References (IDOR) vulnerability
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Curly curly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Curly: from n/a through <= 3.3.
References
Affected products
curly
- =<<= 3.3
Matching in nixpkgs
pkgs.ocamlPackages.curly
Curly is a brain dead wrapper around the curl command line utility
pkgs.haskellPackages.recurly-client
Client for Recurly subscription management
Package maintainers
-
@sternenseemann Lukas Epple <sternenseemann@systemli.org>