CVE-2025-11191: CWE-862 Missing Authorization in RealPress
The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.
AI Analysis
Technical Summary
CVE-2025-11191 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the RealPress WordPress plugin versions prior to 1.1.0. The core issue lies in the plugin's registration of REST API routes without enforcing proper permission checks, which means that any unauthenticated user can invoke these endpoints. Specifically, attackers can create new pages on the WordPress site and send emails through the site’s mail functionality. This unauthorized access to REST routes bypasses normal WordPress permission mechanisms, allowing attackers to manipulate site content and potentially use the site as a vector for phishing or spam campaigns. The vulnerability does not require authentication or user interaction, making it straightforward to exploit remotely. Although no exploits have been reported in the wild yet, the exposure of these capabilities poses a significant risk. The affected versions are all versions before 1.1.0, with no patch currently linked, indicating that users must remain vigilant and apply updates or mitigations once available. The vulnerability was reserved on 2025-09-30 and published on 2025-10-31, with WPScan as the assigner. The lack of a CVSS score necessitates an independent severity assessment based on the impact and exploitability factors.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized content creation on corporate or public-facing websites, damaging brand reputation and trust. Attackers could inject malicious or misleading pages, potentially facilitating phishing attacks targeting customers or employees. The ability to send emails from the compromised site increases the risk of spam or spear-phishing campaigns that appear legitimate, potentially bypassing email filters due to originating from a trusted domain. This can result in data breaches, financial fraud, or malware distribution. Organizations relying on RealPress for content management or marketing may face operational disruptions and increased incident response costs. The vulnerability's ease of exploitation without authentication means attackers can rapidly compromise multiple sites, amplifying the threat landscape. Given the widespread use of WordPress in Europe, especially among SMEs and public institutions, the impact could be broad if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps include disabling the RealPress plugin if feasible until a patched version is released. Administrators should monitor and restrict access to the WordPress REST API endpoints using web application firewalls (WAFs) or custom server rules to block unauthorized requests targeting RealPress routes. Implementing strict IP whitelisting or authentication mechanisms for REST API access can reduce exposure. Site owners should audit existing pages and email logs for suspicious activity indicative of exploitation. Once a patched version is available, promptly update the plugin to ensure proper authorization checks are enforced. Additionally, organizations should enhance monitoring for anomalous page creation or email sending patterns and educate staff about phishing risks stemming from compromised site emails. Employing security plugins that enforce REST API permission checks or rate limiting can provide additional layers of defense.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11191: CWE-862 Missing Authorization in RealPress
Description
The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-11191 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the RealPress WordPress plugin versions prior to 1.1.0. The core issue lies in the plugin's registration of REST API routes without enforcing proper permission checks, which means that any unauthenticated user can invoke these endpoints. Specifically, attackers can create new pages on the WordPress site and send emails through the site’s mail functionality. This unauthorized access to REST routes bypasses normal WordPress permission mechanisms, allowing attackers to manipulate site content and potentially use the site as a vector for phishing or spam campaigns. The vulnerability does not require authentication or user interaction, making it straightforward to exploit remotely. Although no exploits have been reported in the wild yet, the exposure of these capabilities poses a significant risk. The affected versions are all versions before 1.1.0, with no patch currently linked, indicating that users must remain vigilant and apply updates or mitigations once available. The vulnerability was reserved on 2025-09-30 and published on 2025-10-31, with WPScan as the assigner. The lack of a CVSS score necessitates an independent severity assessment based on the impact and exploitability factors.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized content creation on corporate or public-facing websites, damaging brand reputation and trust. Attackers could inject malicious or misleading pages, potentially facilitating phishing attacks targeting customers or employees. The ability to send emails from the compromised site increases the risk of spam or spear-phishing campaigns that appear legitimate, potentially bypassing email filters due to originating from a trusted domain. This can result in data breaches, financial fraud, or malware distribution. Organizations relying on RealPress for content management or marketing may face operational disruptions and increased incident response costs. The vulnerability's ease of exploitation without authentication means attackers can rapidly compromise multiple sites, amplifying the threat landscape. Given the widespread use of WordPress in Europe, especially among SMEs and public institutions, the impact could be broad if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps include disabling the RealPress plugin if feasible until a patched version is released. Administrators should monitor and restrict access to the WordPress REST API endpoints using web application firewalls (WAFs) or custom server rules to block unauthorized requests targeting RealPress routes. Implementing strict IP whitelisting or authentication mechanisms for REST API access can reduce exposure. Site owners should audit existing pages and email logs for suspicious activity indicative of exploitation. Once a patched version is available, promptly update the plugin to ensure proper authorization checks are enforced. Additionally, organizations should enhance monitoring for anomalous page creation or email sending patterns and educate staff about phishing risks stemming from compromised site emails. Employing security plugins that enforce REST API permission checks or rate limiting can provide additional layers of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-30T12:38:44.699Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69045e81d694fb7fc7296d01
Added to database: 10/31/2025, 7:00:17 AM
Last enriched: 10/31/2025, 7:00:40 AM
Last updated: 11/1/2025, 3:42:53 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.