Plisio Plugin Flaw: Unauthenticated Access Control Bypass
A significant “Missing Authorization” vulnerability, tracked as CVE-2026-6372, has been identified in the “Accept Cryptocurrencies with Plisio” plugin. According to the National Vulnerability Database, this flaw allows for the exploitation of incorrectly configured access control security levels, presenting a clear path for unauthenticated attackers to bypass authorization. The issue impacts versions of the Plisio plugin up to and including 2.0.5.
This isn’t some esoteric bug; a CVSS v3.1 score of 7.5 (HIGH) with an AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N vector means it’s exploitable over the network without any user interaction or privileges. Essentially, an attacker could manipulate access controls to achieve a high impact on integrity (I:H), though confidentiality and availability are not directly impacted by this specific vector. The root cause is categorized under CWE-862, which points directly to insufficient authorization checks—a classic blunder that often leads to serious headaches down the line.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6372
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6372 | Auth Bypass | Plisio Accept Cryptocurrencies with Plisio plugin versions n/a through 2.0.5 |
| CVE-2026-6372 | Misconfiguration | Incorrectly Configured Access Control Security Levels |
| CVE-2026-6372 | Auth Bypass | Missing Authorization vulnerability |