
Cloud Vulnerability DB
A community-led vulnerabilities database
A Missing Authorization vulnerability was identified in the Travis Simple Icons WordPress plugin, affecting all versions up to and including 2.8.4. The vulnerability was discovered by Trương Hữu Phúc and publicly disclosed on April 1, 2025. The issue stems from missing capability checks in certain plugin functions, which could potentially lead to unauthorized access (WPScan, Patchstack).
The vulnerability has been assigned CVE-2025-31786 and is classified as CWE-862 (Missing Authorization). It received a CVSS v3.1 score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The issue is categorized under the OWASP Top 10 as A5: Broken Access Control, indicating a fundamental security control failure (Patchstack).
The vulnerability allows unauthenticated attackers to perform unauthorized actions within the WordPress installation. The security issue has been assessed as having a low severity impact, though it still presents a security risk to affected installations (WPScan).
Currently, there is no official fix available for this vulnerability. The software appears to be abandoned, as it hasn't received updates for over a year. Security experts recommend removing and replacing the plugin with an alternative solution. Deactivating the software alone does not remove the security threat unless a virtual patch is deployed (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."