Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 15 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Villatheme
Villatheme compe Wordpress Wordpress wordpress |
|
| Vendors & Products |
Villatheme
Villatheme compe Wordpress Wordpress wordpress |
Wed, 15 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in VillaTheme COMPE compe-woo-compare-products allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects COMPE: from n/a through <= 1.1.4. | |
| Title | WordPress COMPE plugin <= 1.1.4 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-29T09:52:04.845Z
Reserved: 2026-04-15T09:19:28.916Z
Link: CVE-2026-40737
Updated: 2026-04-15T15:48:10.741Z
Status : Deferred
Published: 2026-04-15T11:16:36.053
Modified: 2026-04-22T20:23:16.350
Link: CVE-2026-40737
No data.
OpenCVE Enrichment
Updated: 2026-04-15T19:30:12Z