Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11003: CWE-862 Missing Authorization in admintwentytwenty UiPress lite | Effortless custom dashboards, admin themes and pages

0
Medium
VulnerabilityCVE-2025-11003cvecve-2025-11003cwe-862
Published: Fri Nov 21 2025 (11/21/2025, 07:31:55 UTC)
Source: CVE Database V5
Vendor/Project: admintwentytwenty
Product: UiPress lite | Effortless custom dashboards, admin themes and pages

Description

The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_ui_template' function in all versions up to, and including, 3.5.08. This makes it possible for authenticated attackers, with Subscriber-level access and above, to save templates that contain custom JavaScript.

AI-Powered Analysis

AILast updated: 11/28/2025, 08:43:39 UTC

Technical Analysis

CVE-2025-11003 is a vulnerability classified under CWE-862 (Missing Authorization) found in the UiPress lite WordPress plugin, which facilitates the creation of custom dashboards, admin themes, and pages. The vulnerability stems from the 'uip_save_ui_template' function lacking proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to save UI templates containing arbitrary JavaScript code. This missing authorization check means that lower-privileged users can inject scripts that may execute in the context of higher-privileged users or administrators, potentially leading to cross-site scripting (XSS) attacks or unauthorized modifications of the WordPress admin interface. The vulnerability affects all versions up to and including 3.5.08. The CVSS v3.1 score is 6.4 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially compromised user. Although no public exploits are known, the vulnerability's nature makes it a significant risk in environments where multiple users have WordPress accounts with varying privilege levels. The plugin's popularity and the widespread use of WordPress in European organizations increase the potential attack surface. The vulnerability could be exploited to inject malicious JavaScript, leading to data leakage, session hijacking, or further privilege escalation within the WordPress environment.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of data within WordPress environments using the UiPress lite plugin. Attackers with subscriber-level access could inject malicious JavaScript, potentially leading to session hijacking, unauthorized data access, or manipulation of admin dashboards. This could result in compromised user accounts, defacement of websites, or pivoting to other internal systems if administrative credentials are exposed. Given the extensive use of WordPress across European public and private sectors, including government portals, e-commerce, and media sites, exploitation could disrupt services and damage organizational reputations. The vulnerability does not directly impact availability but could indirectly cause downtime if exploited for defacement or administrative disruption. The medium severity reflects a moderate but tangible threat, especially in multi-user WordPress installations common in European enterprises and institutions.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the UiPress lite plugin and verify the version in use. Since no official patches are currently linked, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only, removing or disabling it for subscriber-level users. 2) Implement custom capability checks or filters to enforce strict authorization on the 'uip_save_ui_template' function, preventing unauthorized template saves. 3) Monitor WordPress logs and plugin activity for unusual template modifications or JavaScript injections. 4) Employ Web Application Firewalls (WAFs) with rules targeting suspicious admin interface activity or script injections. 5) Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of compromised subscriber accounts. 6) Regularly update WordPress core and plugins, and subscribe to security advisories for timely patching once available. 7) Consider isolating WordPress admin interfaces behind VPNs or IP whitelisting to limit exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-25T19:27:06.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69202359cf2d47c38997b394

Added to database: 11/21/2025, 8:31:21 AM

Last enriched: 11/28/2025, 8:43:39 AM

Last updated: 1/7/2026, 5:24:23 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats