CVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
AI Analysis
Technical Summary
CVE-2025-11587 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.5.3 of the 'Call Now Button – The #1 Click to Call Button' WordPress plugin developed by jgrietveld. The root cause is the absence of a capability check in the plugin's activate function, which is responsible for linking the plugin to an external nowbuttons.com account. This missing authorization allows any authenticated user with at least Subscriber-level privileges to activate the plugin and associate it with their own account. Consequently, the attacker can add malicious call buttons to the WordPress site, potentially misleading visitors or redirecting calls to attacker-controlled numbers. The vulnerability is exploitable only on fresh plugin installations that have not been previously configured with an API key, limiting the attack surface to new or reset deployments. The CVSS v3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity without affecting confidentiality or availability. No patches or fixes have been published yet, and no active exploitation has been reported. The vulnerability highlights the importance of proper authorization checks in plugin activation workflows, especially for plugins interfacing with external services.
Potential Impact
The primary impact of CVE-2025-11587 is unauthorized modification of site content through the injection of malicious call buttons. This can undermine the integrity of the affected WordPress site by displaying attacker-controlled phone numbers, potentially leading to social engineering, fraud, or reputational damage. While confidentiality and availability are not directly affected, the presence of malicious buttons can erode user trust and may facilitate further attacks such as phishing or scams. Organizations with open user registration or low-privilege user roles are at higher risk, as attackers only need Subscriber-level access to exploit the vulnerability. The limitation to fresh installs reduces the scope somewhat but does not eliminate risk for new deployments or sites that reset plugin configurations. Given the popularity of WordPress and the plugin’s niche, small to medium businesses relying on click-to-call functionality could be disproportionately impacted. The lack of known exploits in the wild suggests limited current threat activity, but the vulnerability could be leveraged in targeted attacks or automated campaigns once weaponized.
Mitigation Recommendations
To mitigate CVE-2025-11587, site administrators should immediately restrict plugin activation capabilities to trusted administrator roles, preventing Subscribers or other low-privilege users from activating or configuring the plugin. Disable or remove the plugin on sites where it is not essential, especially on fresh installs. Monitor WordPress sites for unexpected or unauthorized call buttons linking to unknown accounts on nowbuttons.com. Implement strict user role management and limit user registrations to trusted individuals to reduce the risk of exploitation. Since no official patch is currently available, consider applying custom code to enforce capability checks on the activate function or temporarily block plugin activation via hooks or filters. Stay alert for vendor updates or security advisories providing patches and apply them promptly. Additionally, conduct regular security audits and vulnerability scans focusing on plugin configurations and user permissions to detect potential misuse early.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands
CVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
Description
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11587 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions up to and including 1.5.3 of the 'Call Now Button – The #1 Click to Call Button' WordPress plugin developed by jgrietveld. The root cause is the absence of a capability check in the plugin's activate function, which is responsible for linking the plugin to an external nowbuttons.com account. This missing authorization allows any authenticated user with at least Subscriber-level privileges to activate the plugin and associate it with their own account. Consequently, the attacker can add malicious call buttons to the WordPress site, potentially misleading visitors or redirecting calls to attacker-controlled numbers. The vulnerability is exploitable only on fresh plugin installations that have not been previously configured with an API key, limiting the attack surface to new or reset deployments. The CVSS v3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity without affecting confidentiality or availability. No patches or fixes have been published yet, and no active exploitation has been reported. The vulnerability highlights the importance of proper authorization checks in plugin activation workflows, especially for plugins interfacing with external services.
Potential Impact
The primary impact of CVE-2025-11587 is unauthorized modification of site content through the injection of malicious call buttons. This can undermine the integrity of the affected WordPress site by displaying attacker-controlled phone numbers, potentially leading to social engineering, fraud, or reputational damage. While confidentiality and availability are not directly affected, the presence of malicious buttons can erode user trust and may facilitate further attacks such as phishing or scams. Organizations with open user registration or low-privilege user roles are at higher risk, as attackers only need Subscriber-level access to exploit the vulnerability. The limitation to fresh installs reduces the scope somewhat but does not eliminate risk for new deployments or sites that reset plugin configurations. Given the popularity of WordPress and the plugin’s niche, small to medium businesses relying on click-to-call functionality could be disproportionately impacted. The lack of known exploits in the wild suggests limited current threat activity, but the vulnerability could be leveraged in targeted attacks or automated campaigns once weaponized.
Mitigation Recommendations
To mitigate CVE-2025-11587, site administrators should immediately restrict plugin activation capabilities to trusted administrator roles, preventing Subscribers or other low-privilege users from activating or configuring the plugin. Disable or remove the plugin on sites where it is not essential, especially on fresh installs. Monitor WordPress sites for unexpected or unauthorized call buttons linking to unknown accounts on nowbuttons.com. Implement strict user role management and limit user registrations to trusted individuals to reduce the risk of exploitation. Since no official patch is currently available, consider applying custom code to enforce capability checks on the activate function or temporarily block plugin activation via hooks or filters. Stay alert for vendor updates or security advisories providing patches and apply them promptly. Additionally, conduct regular security audits and vulnerability scans focusing on plugin configurations and user permissions to detect potential misuse early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-10T12:10:27.428Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69020d512a3e20b1cb02a670
Added to database: 10/29/2025, 12:49:21 PM
Last enriched: 2/27/2026, 7:08:58 PM
Last updated: 3/23/2026, 6:46:01 AM
Views: 141
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.