Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11191: CWE-862 Missing Authorization in RealPress

0
Medium
VulnerabilityCVE-2025-11191cvecve-2025-11191cwe-862
Published: Fri Oct 31 2025 (10/31/2025, 06:00:03 UTC)
Source: CVE Database V5
Product: RealPress

Description

The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.

AI-Powered Analysis

AILast updated: 10/31/2025, 07:00:40 UTC

Technical Analysis

CVE-2025-11191 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the RealPress WordPress plugin versions prior to 1.1.0. The core issue lies in the plugin's registration of REST API routes without enforcing proper permission checks, which means that any unauthenticated user can invoke these endpoints. Specifically, attackers can create new pages on the WordPress site and send emails through the site’s mail functionality. This unauthorized access to REST routes bypasses normal WordPress permission mechanisms, allowing attackers to manipulate site content and potentially use the site as a vector for phishing or spam campaigns. The vulnerability does not require authentication or user interaction, making it straightforward to exploit remotely. Although no exploits have been reported in the wild yet, the exposure of these capabilities poses a significant risk. The affected versions are all versions before 1.1.0, with no patch currently linked, indicating that users must remain vigilant and apply updates or mitigations once available. The vulnerability was reserved on 2025-09-30 and published on 2025-10-31, with WPScan as the assigner. The lack of a CVSS score necessitates an independent severity assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized content creation on corporate or public-facing websites, damaging brand reputation and trust. Attackers could inject malicious or misleading pages, potentially facilitating phishing attacks targeting customers or employees. The ability to send emails from the compromised site increases the risk of spam or spear-phishing campaigns that appear legitimate, potentially bypassing email filters due to originating from a trusted domain. This can result in data breaches, financial fraud, or malware distribution. Organizations relying on RealPress for content management or marketing may face operational disruptions and increased incident response costs. The vulnerability's ease of exploitation without authentication means attackers can rapidly compromise multiple sites, amplifying the threat landscape. Given the widespread use of WordPress in Europe, especially among SMEs and public institutions, the impact could be broad if not mitigated promptly.

Mitigation Recommendations

Immediate mitigation steps include disabling the RealPress plugin if feasible until a patched version is released. Administrators should monitor and restrict access to the WordPress REST API endpoints using web application firewalls (WAFs) or custom server rules to block unauthorized requests targeting RealPress routes. Implementing strict IP whitelisting or authentication mechanisms for REST API access can reduce exposure. Site owners should audit existing pages and email logs for suspicious activity indicative of exploitation. Once a patched version is available, promptly update the plugin to ensure proper authorization checks are enforced. Additionally, organizations should enhance monitoring for anomalous page creation or email sending patterns and educate staff about phishing risks stemming from compromised site emails. Employing security plugins that enforce REST API permission checks or rate limiting can provide additional layers of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-09-30T12:38:44.699Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69045e81d694fb7fc7296d01

Added to database: 10/31/2025, 7:00:17 AM

Last enriched: 10/31/2025, 7:00:40 AM

Last updated: 11/1/2025, 3:42:53 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats