Description
The Post Type Switcher plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.0.0 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to modify the post type of arbitrary posts and pages they do not own, including those created by administrators, which can lead to site disruption, broken navigation, and SEO impact.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
* (semver)
Timeline
| 2025-11-17: | Disclosed |
Credits
Athiwat Tiprasaharn
References
www.wordfence.com/...-c7d3-4236-842b-6e772048448d?source=cve
plugins.trac.wordpress.org/...s/4.0.0/post-type-switcher.php
plugins.trac.wordpress.org/...s/4.0.0/post-type-switcher.php
cwe.mitre.org/data/definitions/639.html
owasp.org/...2023/en/0xa1-broken-object-level-authorization/
plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=