Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11164: CWE-862 Missing Authorization in creativthemes Mavix Education

0
Medium
VulnerabilityCVE-2025-11164cvecve-2025-11164cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:30 UTC)
Source: CVE Database V5
Vendor/Project: creativthemes
Product: Mavix Education

Description

The Mavix Education theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mavix_education_activate_plugin' AJAX action in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate the Creativ Demo Importer plugin.

AI-Powered Analysis

AILast updated: 12/20/2025, 06:14:01 UTC

Technical Analysis

CVE-2025-11164 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Mavix Education WordPress theme developed by creativthemes. The issue stems from the absence of a capability check on the AJAX action 'mavix_education_activate_plugin' across all versions up to and including 1.0. This flaw allows any authenticated user with at least Subscriber-level access to activate the Creativ Demo Importer plugin remotely without proper authorization. Since WordPress roles like Subscriber typically have minimal privileges, this vulnerability escalates their ability to modify the site by enabling plugin activation, which can lead to unauthorized changes or potential further exploitation if the imported plugin contains vulnerabilities or malicious code. The vulnerability does not expose confidential data nor does it cause denial of service, but it compromises the integrity of the WordPress installation by permitting unauthorized plugin activation. The attack vector is network-based, requiring authentication but no user interaction beyond that. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS 3.1 base score is 4.3, reflecting low complexity of attack but limited impact confined to integrity with no confidentiality or availability loss. This vulnerability is particularly relevant for websites using the Mavix Education theme, which is often deployed in educational contexts or small business sites that rely on WordPress themes for content management and presentation.

Potential Impact

For European organizations, the primary impact of CVE-2025-11164 lies in the unauthorized modification of website components, specifically the activation of plugins without proper authorization. This can lead to integrity violations where unauthorized plugins could introduce malicious code, backdoors, or further vulnerabilities. Educational institutions, small businesses, and non-profits using the Mavix Education theme are at risk of having their websites altered, potentially damaging their reputation or exposing them to subsequent attacks. Although confidentiality and availability are not directly impacted, the integrity compromise can facilitate lateral attacks or data manipulation. The requirement for authenticated access limits exploitation to insiders or users with compromised credentials, but given that Subscriber roles are commonly assigned to registered users or customers, the attack surface is significant. The absence of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or automated scanning campaigns. Organizations relying on WordPress for public-facing or internal portals should consider this a moderate threat to their web infrastructure security posture.

Mitigation Recommendations

1. Immediately audit user roles and permissions to ensure that Subscriber-level users do not have unnecessary access or privileges beyond their intended scope. 2. Restrict or disable the ability for Subscribers to perform actions that could lead to plugin activation or modification. 3. Monitor WordPress logs and plugin activation events for unusual or unauthorized activity, especially related to the Creativ Demo Importer plugin. 4. Implement web application firewalls (WAF) with rules to detect and block unauthorized AJAX requests targeting 'mavix_education_activate_plugin'. 5. Apply principle of least privilege for all user accounts and consider multi-factor authentication to reduce risk of credential compromise. 6. Stay alert for official patches or updates from creativthemes and apply them promptly once released. 7. If feasible, temporarily disable or remove the Creativ Demo Importer plugin until the vulnerability is addressed. 8. Educate site administrators and users about the risks of unauthorized plugin activation and encourage regular security reviews of WordPress installations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-29T16:42:40.617Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef62d977419e584a4fc4

Added to database: 12/13/2025, 4:45:22 AM

Last enriched: 12/20/2025, 6:14:01 AM

Last updated: 2/7/2026, 8:45:51 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats