CVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
AI Analysis
Technical Summary
CVE-2025-11587 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.5.3 of the 'Call Now Button – The #1 Click to Call Button' WordPress plugin developed by jgrietveld. The root cause is the absence of a capability check in the plugin's activation function, which is responsible for linking the plugin to an external nowbuttons.com account via an API key. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can exploit the vulnerability on fresh plugin installations that have not been configured with an API key. Such an attacker can link the plugin to their own account and add malicious call buttons to the WordPress site, potentially misleading site visitors or redirecting calls to attacker-controlled numbers. The vulnerability is remotely exploitable without user interaction and does not require elevated privileges beyond Subscriber-level access, which is a low privilege role in WordPress. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear integrity impact due to unauthorized modification of plugin data. No patches or fixes are currently linked, and no known exploits are reported in the wild. The vulnerability is particularly relevant for sites that have recently installed the plugin and have not yet completed initial configuration steps.
Potential Impact
For European organizations, the primary impact is the unauthorized modification of website content via malicious call buttons, which can lead to reputational damage, user deception, and potential fraud if visitors are redirected to attacker-controlled phone numbers. While the vulnerability does not directly compromise sensitive data confidentiality or site availability, the integrity of the website's user interface and trustworthiness is at risk. Organizations relying on WordPress sites with this plugin, especially those with multiple users having Subscriber-level access (e.g., content contributors), are vulnerable. Attackers could exploit this to conduct social engineering or phishing campaigns via the website. The risk is heightened for fresh plugin installations that have not been configured, which may be common in newly deployed or recently updated sites. Given the medium severity and ease of exploitation by low-privilege users, the vulnerability could be leveraged as a foothold for further attacks or to damage brand reputation.
Mitigation Recommendations
European organizations should immediately verify whether the 'Call Now Button – The #1 Click to Call Button' plugin is installed on their WordPress sites and identify the version in use. For fresh installs, the plugin should be configured with a valid API key as soon as possible to prevent exploitation. If the plugin is not essential, consider uninstalling it to eliminate risk. Site administrators should audit user roles and restrict Subscriber-level access to trusted users only. Implement monitoring to detect unauthorized changes to plugin settings or unexpected call button additions. Since no patch is currently available, applying strict access controls and completing initial plugin configuration are critical. Additionally, organizations should keep abreast of updates from the plugin vendor or WordPress security advisories for forthcoming patches. Employing a Web Application Firewall (WAF) with rules to detect anomalous plugin activation requests could provide temporary protection. Finally, educating content contributors about the risk and signs of malicious buttons can aid early detection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
Description
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
AI-Powered Analysis
Technical Analysis
CVE-2025-11587 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.5.3 of the 'Call Now Button – The #1 Click to Call Button' WordPress plugin developed by jgrietveld. The root cause is the absence of a capability check in the plugin's activation function, which is responsible for linking the plugin to an external nowbuttons.com account via an API key. Because of this missing authorization, any authenticated user with at least Subscriber-level privileges can exploit the vulnerability on fresh plugin installations that have not been configured with an API key. Such an attacker can link the plugin to their own account and add malicious call buttons to the WordPress site, potentially misleading site visitors or redirecting calls to attacker-controlled numbers. The vulnerability is remotely exploitable without user interaction and does not require elevated privileges beyond Subscriber-level access, which is a low privilege role in WordPress. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear integrity impact due to unauthorized modification of plugin data. No patches or fixes are currently linked, and no known exploits are reported in the wild. The vulnerability is particularly relevant for sites that have recently installed the plugin and have not yet completed initial configuration steps.
Potential Impact
For European organizations, the primary impact is the unauthorized modification of website content via malicious call buttons, which can lead to reputational damage, user deception, and potential fraud if visitors are redirected to attacker-controlled phone numbers. While the vulnerability does not directly compromise sensitive data confidentiality or site availability, the integrity of the website's user interface and trustworthiness is at risk. Organizations relying on WordPress sites with this plugin, especially those with multiple users having Subscriber-level access (e.g., content contributors), are vulnerable. Attackers could exploit this to conduct social engineering or phishing campaigns via the website. The risk is heightened for fresh plugin installations that have not been configured, which may be common in newly deployed or recently updated sites. Given the medium severity and ease of exploitation by low-privilege users, the vulnerability could be leveraged as a foothold for further attacks or to damage brand reputation.
Mitigation Recommendations
European organizations should immediately verify whether the 'Call Now Button – The #1 Click to Call Button' plugin is installed on their WordPress sites and identify the version in use. For fresh installs, the plugin should be configured with a valid API key as soon as possible to prevent exploitation. If the plugin is not essential, consider uninstalling it to eliminate risk. Site administrators should audit user roles and restrict Subscriber-level access to trusted users only. Implement monitoring to detect unauthorized changes to plugin settings or unexpected call button additions. Since no patch is currently available, applying strict access controls and completing initial plugin configuration are critical. Additionally, organizations should keep abreast of updates from the plugin vendor or WordPress security advisories for forthcoming patches. Employing a Web Application Firewall (WAF) with rules to detect anomalous plugin activation requests could provide temporary protection. Finally, educating content contributors about the risk and signs of malicious buttons can aid early detection.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-10T12:10:27.428Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69020d512a3e20b1cb02a670
Added to database: 10/29/2025, 12:49:21 PM
Last enriched: 12/27/2025, 4:25:43 AM
Last updated: 2/7/2026, 5:03:56 AM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.