Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-4117
PUBLISHED
More InfoOfficial Page
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 07:45
Updated At-22 Apr, 2026 | 12:10
Rejected At-
▼CVE Numbering Authority (CNA)
CalJ <= 1.5 - Authenticated (Subscriber+) Arbitrary Settings Modification via 'save-obtained-key' Action

The CalJ plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.5. This is due to a missing capability check in the CalJSettingsPage class constructor, which processes the 'save-obtained-key' operation directly from POST data without verifying that the requesting user has the 'manage_options' capability, and without any nonce verification. The plugin bootstrap file (calj.php) instantiates CalJSettingsPage whenever is_admin() returns true, which is the case for any authenticated user making requests to wp-admin URLs (including admin-ajax.php). This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's API key setting and clear the Shabbat cache, effectively taking control of the plugin's API integration.

Affected Products
Vendor
calj
Product
CalJ Shabbat Times
Default Status
unaffected
Versions
Affected
  • From 0 through 1.5 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-862CWE-862 Missing Authorization
Type: CWE
CWE ID: CWE-862
Description: CWE-862 Missing Authorization
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Nabil Irawan
Timeline
EventDate
Disclosed2026-04-21 19:08:40
Event: Disclosed
Date: 2026-04-21 19:08:40
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c7df8e-2f82-4474-88ef-8c8ddaeb4656?source=cve
N/A
https://plugins.trac.wordpress.org/browser/calj/trunk/CalJSettingsPage.php#L30
N/A
https://plugins.trac.wordpress.org/browser/calj/tags/1.5/CalJSettingsPage.php#L30
N/A
https://plugins.trac.wordpress.org/browser/calj/trunk/CalJSettingsPage.php#L25
N/A
https://plugins.trac.wordpress.org/browser/calj/tags/1.5/CalJSettingsPage.php#L25
N/A
https://plugins.trac.wordpress.org/browser/calj/trunk/calj.php#L17
N/A
https://plugins.trac.wordpress.org/browser/calj/tags/1.5/calj.php#L17
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c7df8e-2f82-4474-88ef-8c8ddaeb4656?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/trunk/CalJSettingsPage.php#L30
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/tags/1.5/CalJSettingsPage.php#L30
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/trunk/CalJSettingsPage.php#L25
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/tags/1.5/CalJSettingsPage.php#L25
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/trunk/calj.php#L17
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/calj/tags/1.5/calj.php#L17
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found