CVE-2025-11003: CWE-862 Missing Authorization in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages
The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_ui_template' function in all versions up to, and including, 3.5.08. This makes it possible for authenticated attackers, with Subscriber-level access and above, to save templates that contain custom JavaScript.
AI Analysis
Technical Summary
CVE-2025-11003 is a vulnerability classified under CWE-862 (Missing Authorization) found in the UiPress lite WordPress plugin, which facilitates the creation of custom dashboards, admin themes, and pages. The vulnerability stems from the 'uip_save_ui_template' function lacking proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to save UI templates containing arbitrary JavaScript code. This missing authorization check means that lower-privileged users can inject scripts that may execute in the context of higher-privileged users or administrators, potentially leading to cross-site scripting (XSS) attacks or unauthorized modifications of the WordPress admin interface. The vulnerability affects all versions up to and including 3.5.08. The CVSS v3.1 score is 6.4 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially compromised user. Although no public exploits are known, the vulnerability's nature makes it a significant risk in environments where multiple users have WordPress accounts with varying privilege levels. The plugin's popularity and the widespread use of WordPress in European organizations increase the potential attack surface. The vulnerability could be exploited to inject malicious JavaScript, leading to data leakage, session hijacking, or further privilege escalation within the WordPress environment.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of data within WordPress environments using the UiPress lite plugin. Attackers with subscriber-level access could inject malicious JavaScript, potentially leading to session hijacking, unauthorized data access, or manipulation of admin dashboards. This could result in compromised user accounts, defacement of websites, or pivoting to other internal systems if administrative credentials are exposed. Given the extensive use of WordPress across European public and private sectors, including government portals, e-commerce, and media sites, exploitation could disrupt services and damage organizational reputations. The vulnerability does not directly impact availability but could indirectly cause downtime if exploited for defacement or administrative disruption. The medium severity reflects a moderate but tangible threat, especially in multi-user WordPress installations common in European enterprises and institutions.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the UiPress lite plugin and verify the version in use. Since no official patches are currently linked, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only, removing or disabling it for subscriber-level users. 2) Implement custom capability checks or filters to enforce strict authorization on the 'uip_save_ui_template' function, preventing unauthorized template saves. 3) Monitor WordPress logs and plugin activity for unusual template modifications or JavaScript injections. 4) Employ Web Application Firewalls (WAFs) with rules targeting suspicious admin interface activity or script injections. 5) Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of compromised subscriber accounts. 6) Regularly update WordPress core and plugins, and subscribe to security advisories for timely patching once available. 7) Consider isolating WordPress admin interfaces behind VPNs or IP whitelisting to limit exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11003: CWE-862 Missing Authorization in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages
Description
The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_ui_template' function in all versions up to, and including, 3.5.08. This makes it possible for authenticated attackers, with Subscriber-level access and above, to save templates that contain custom JavaScript.
AI-Powered Analysis
Technical Analysis
CVE-2025-11003 is a vulnerability classified under CWE-862 (Missing Authorization) found in the UiPress lite WordPress plugin, which facilitates the creation of custom dashboards, admin themes, and pages. The vulnerability stems from the 'uip_save_ui_template' function lacking proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to save UI templates containing arbitrary JavaScript code. This missing authorization check means that lower-privileged users can inject scripts that may execute in the context of higher-privileged users or administrators, potentially leading to cross-site scripting (XSS) attacks or unauthorized modifications of the WordPress admin interface. The vulnerability affects all versions up to and including 3.5.08. The CVSS v3.1 score is 6.4 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially compromised user. Although no public exploits are known, the vulnerability's nature makes it a significant risk in environments where multiple users have WordPress accounts with varying privilege levels. The plugin's popularity and the widespread use of WordPress in European organizations increase the potential attack surface. The vulnerability could be exploited to inject malicious JavaScript, leading to data leakage, session hijacking, or further privilege escalation within the WordPress environment.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of data within WordPress environments using the UiPress lite plugin. Attackers with subscriber-level access could inject malicious JavaScript, potentially leading to session hijacking, unauthorized data access, or manipulation of admin dashboards. This could result in compromised user accounts, defacement of websites, or pivoting to other internal systems if administrative credentials are exposed. Given the extensive use of WordPress across European public and private sectors, including government portals, e-commerce, and media sites, exploitation could disrupt services and damage organizational reputations. The vulnerability does not directly impact availability but could indirectly cause downtime if exploited for defacement or administrative disruption. The medium severity reflects a moderate but tangible threat, especially in multi-user WordPress installations common in European enterprises and institutions.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the UiPress lite plugin and verify the version in use. Since no official patches are currently linked, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only, removing or disabling it for subscriber-level users. 2) Implement custom capability checks or filters to enforce strict authorization on the 'uip_save_ui_template' function, preventing unauthorized template saves. 3) Monitor WordPress logs and plugin activity for unusual template modifications or JavaScript injections. 4) Employ Web Application Firewalls (WAFs) with rules targeting suspicious admin interface activity or script injections. 5) Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of compromised subscriber accounts. 6) Regularly update WordPress core and plugins, and subscribe to security advisories for timely patching once available. 7) Consider isolating WordPress admin interfaces behind VPNs or IP whitelisting to limit exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-25T19:27:06.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b394
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 11/28/2025, 8:43:39 AM
Last updated: 1/7/2026, 5:24:23 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.