Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0951: CWE-862 Missing Authorization in LiquidThemes AI Hub - Startup & Technology WordPress Theme

0
Medium
VulnerabilityCVE-2025-0951cvecve-2025-0951cwe-862
Published: Thu Aug 28 2025 (08/28/2025, 03:42:43 UTC)
Source: CVE Database V5
Vendor/Project: LiquidThemes
Product: AI Hub - Startup & Technology WordPress Theme

Description

Multiple plugins and/or themes for WordPress by LiquidThemes are vulnerable to unauthorized access due to a missing capability check on the liquid_reset_wordpress_before AJAX in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to deactivate all of a site's plugins. While we escalated this to Envato after not being able to establish contact, it appears the developer added a nonce check, however that is not sufficient protection as the nonce is exposed to all users with access to the dashboard.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 17:57:00 UTC

Technical Analysis

CVE-2025-0951 is a vulnerability categorized under CWE-862 (Missing Authorization) found in the LiquidThemes AI Hub - Startup & Technology WordPress theme affecting all versions. The root cause is the absence of proper capability checks on the AJAX action liquid_reset_wordpress_before, which is responsible for resetting or deactivating plugins. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this AJAX endpoint and deactivate all plugins on the WordPress site. The developer attempted to mitigate the issue by adding a nonce check; however, this nonce is exposed to all users with dashboard access, rendering the protection ineffective. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a notable impact on integrity since plugins can be disabled, potentially disrupting site functionality and security controls. No patches or updates have been linked yet, and no known exploits have been observed in the wild. The vulnerability affects all versions of the theme, making it critical for site administrators to apply fixes or implement compensating controls promptly.

Potential Impact

The primary impact of this vulnerability is the unauthorized deactivation of all plugins on affected WordPress sites, which can severely disrupt website functionality, degrade security posture, and potentially expose the site to further attacks if security plugins are disabled. While it does not directly compromise data confidentiality or availability, the loss of plugin functionality can lead to indirect availability issues (e.g., broken features or security controls). Attackers with Subscriber-level access—which is a low-privilege role—can exploit this vulnerability, increasing the risk as such accounts are easier to obtain or compromise. This can affect organizations relying on LiquidThemes AI Hub theme for their WordPress sites, including businesses, startups, and technology companies, potentially causing operational downtime and reputational damage. The vulnerability could also be leveraged as a stepping stone for more advanced attacks if critical security plugins are disabled.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if an official patch or update from LiquidThemes is available and apply it immediately. In the absence of a patch, administrators should restrict Subscriber-level access and above to only trusted users, minimizing the risk of exploitation. Implementing role-based access controls (RBAC) to limit dashboard access and plugin management capabilities is critical. Additionally, custom code can be added to enforce capability checks on the liquid_reset_wordpress_before AJAX action, ensuring only users with Administrator privileges can invoke it. Monitoring and logging AJAX requests related to plugin management can help detect suspicious activity. Disabling or removing unused plugins and themes reduces the attack surface. Regular backups should be maintained to restore plugin configurations if unauthorized changes occur. Finally, educating users about the risks of low-privilege account compromise and enforcing strong authentication mechanisms can reduce exploitation likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-31T19:34:34.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68afd4e9ad5a09ad0068aba6

Added to database: 8/28/2025, 4:02:49 AM

Last enriched: 2/27/2026, 5:57:00 PM

Last updated: 3/25/2026, 4:21:41 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses