CVE-2025-10938: CWE-862 Missing Authorization in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages
The UiPress lite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.08. This is due to missing capability checks in the 'uip_process_block_query' AJAX function. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract sensitive user data including password hashes, emails, and other user information that could be used for account takeover attacks.
AI Analysis
Technical Summary
CVE-2025-10938 is a vulnerability classified under CWE-862 (Missing Authorization) found in the UiPress lite plugin for WordPress, a tool used to create custom dashboards, admin themes, and pages. The flaw exists in all versions up to and including 3.5.08 due to the absence of proper capability checks within the 'uip_process_block_query' AJAX function. This function is accessible to authenticated users with subscriber-level privileges or higher, who normally have limited access rights. Because the plugin fails to verify whether the requesting user has the appropriate permissions, these users can query and retrieve sensitive user information such as password hashes, email addresses, and other personal data. This exposure does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, resulting in a score of 6.5 (medium severity). Although no public exploits are currently known, the vulnerability poses a significant risk for account takeover and further privilege escalation if exploited. The lack of patches at the time of publication necessitates immediate attention from administrators using this plugin.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user data, including password hashes and emails, potentially enabling attackers to perform account takeover attacks. This risk is particularly critical for organizations that rely on WordPress sites for customer engagement, internal portals, or e-commerce, where user data confidentiality is paramount. Exposure of password hashes could facilitate offline brute-force attacks, increasing the likelihood of credential compromise. The vulnerability affects subscriber-level authenticated users, which means that even low-privilege users or compromised accounts could be leveraged to escalate attacks. This could result in data breaches, reputational damage, regulatory penalties under GDPR, and operational disruptions. Organizations with large user bases or those handling sensitive personal data are at higher risk. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and network accessibility make timely remediation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the UiPress lite plugin and its version. Since no official patches are available at the time of this report, administrators should consider the following mitigations: 1) Restrict access to the affected AJAX endpoint by implementing web application firewall (WAF) rules that block or limit requests to 'uip_process_block_query' from untrusted or low-privilege users. 2) Enforce strict user role management to minimize the number of users with subscriber-level or higher access, and monitor for suspicious account activity. 3) Temporarily disable or uninstall the UiPress lite plugin if it is not essential to reduce the attack surface. 4) Monitor logs for unusual AJAX requests or data exfiltration attempts related to the plugin. 5) Prepare to apply patches or updates as soon as they are released by the vendor. 6) Educate site administrators on the importance of plugin security and timely updates. 7) Consider implementing multi-factor authentication (MFA) to reduce the risk of account takeover even if credentials are compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10938: CWE-862 Missing Authorization in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages
Description
The UiPress lite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.08. This is due to missing capability checks in the 'uip_process_block_query' AJAX function. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract sensitive user data including password hashes, emails, and other user information that could be used for account takeover attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-10938 is a vulnerability classified under CWE-862 (Missing Authorization) found in the UiPress lite plugin for WordPress, a tool used to create custom dashboards, admin themes, and pages. The flaw exists in all versions up to and including 3.5.08 due to the absence of proper capability checks within the 'uip_process_block_query' AJAX function. This function is accessible to authenticated users with subscriber-level privileges or higher, who normally have limited access rights. Because the plugin fails to verify whether the requesting user has the appropriate permissions, these users can query and retrieve sensitive user information such as password hashes, email addresses, and other personal data. This exposure does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, resulting in a score of 6.5 (medium severity). Although no public exploits are currently known, the vulnerability poses a significant risk for account takeover and further privilege escalation if exploited. The lack of patches at the time of publication necessitates immediate attention from administrators using this plugin.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user data, including password hashes and emails, potentially enabling attackers to perform account takeover attacks. This risk is particularly critical for organizations that rely on WordPress sites for customer engagement, internal portals, or e-commerce, where user data confidentiality is paramount. Exposure of password hashes could facilitate offline brute-force attacks, increasing the likelihood of credential compromise. The vulnerability affects subscriber-level authenticated users, which means that even low-privilege users or compromised accounts could be leveraged to escalate attacks. This could result in data breaches, reputational damage, regulatory penalties under GDPR, and operational disruptions. Organizations with large user bases or those handling sensitive personal data are at higher risk. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and network accessibility make timely remediation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the UiPress lite plugin and its version. Since no official patches are available at the time of this report, administrators should consider the following mitigations: 1) Restrict access to the affected AJAX endpoint by implementing web application firewall (WAF) rules that block or limit requests to 'uip_process_block_query' from untrusted or low-privilege users. 2) Enforce strict user role management to minimize the number of users with subscriber-level or higher access, and monitor for suspicious account activity. 3) Temporarily disable or uninstall the UiPress lite plugin if it is not essential to reduce the attack surface. 4) Monitor logs for unusual AJAX requests or data exfiltration attempts related to the plugin. 5) Prepare to apply patches or updates as soon as they are released by the vendor. 6) Educate site administrators on the importance of plugin security and timely updates. 7) Consider implementing multi-factor authentication (MFA) to reduce the risk of account takeover even if credentials are compromised.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-25T00:03:45.616Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b37e
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 11/28/2025, 8:43:20 AM
Last updated: 1/7/2026, 5:23:33 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.