CVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.9.4. This is due to insufficient capability checks in the REST API endpoints under the 'fl-controls/v1' namespace that control site-wide Global Presets. This makes it possible for authenticated attackers with contributor-level access and above to add, modify, or delete global color and background presets that affect all Beaver Builder content site-wide.
AI Analysis
Technical Summary
CVE-2025-11726 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Beaver Builder Page Builder plugin for WordPress, specifically in all versions up to and including 2.9.4. The root cause is insufficient capability checks in REST API endpoints within the 'fl-controls/v1' namespace, which manage site-wide Global Presets such as colors and backgrounds. These endpoints fail to properly verify whether the authenticated user has the necessary permissions to modify these global settings. Consequently, any authenticated user with contributor-level privileges or higher can add, modify, or delete global color and background presets. This manipulation affects the entire site’s Beaver Builder content, potentially altering the visual integrity and user experience across all pages built with the plugin. The vulnerability requires authentication but no user interaction beyond that. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope of impact (integrity only), ease of exploitation (low complexity), and the requirement for authenticated access with privileges. No known exploits have been reported in the wild as of the publication date. The vulnerability does not impact confidentiality or availability directly but can be leveraged for defacement or misleading site appearance changes. The lack of patch links suggests that a fix may be pending or users should monitor vendor advisories closely.
Potential Impact
The primary impact of CVE-2025-11726 is on the integrity of website content managed by Beaver Builder. An attacker with contributor-level access can alter global presets, which affects the visual styling of all pages using Beaver Builder, potentially leading to site defacement or brand damage. While this does not expose sensitive data or cause service outages, it undermines trust and user experience. Organizations relying on Beaver Builder for their WordPress sites, especially those with multiple contributors or editors, face a risk of unauthorized content manipulation. This could be exploited in targeted attacks to mislead visitors or disrupt marketing and communication efforts. The vulnerability’s requirement for authenticated access limits exposure but does not eliminate risk in environments with many contributors or where credentials might be compromised. No direct availability or confidentiality impact reduces the severity but does not negate the reputational and operational risks involved.
Mitigation Recommendations
To mitigate CVE-2025-11726, organizations should first verify if they are running Beaver Builder versions up to 2.9.4 and plan for immediate updates once patches are released by the vendor. In the absence of an official patch, administrators should restrict contributor-level access and above to trusted users only, minimizing the attack surface. Implement strict role-based access controls and audit user permissions regularly to ensure no unnecessary privileges are granted. Monitoring REST API usage and logging changes to global presets can help detect suspicious activity early. Additionally, consider implementing Web Application Firewalls (WAF) rules to monitor and potentially block unauthorized REST API calls targeting the 'fl-controls/v1' namespace. Educate contributors about the risks of credential compromise and enforce strong authentication mechanisms such as MFA to reduce the likelihood of unauthorized access. Finally, maintain regular backups of site configurations and presets to enable rapid restoration if unauthorized changes occur.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Netherlands, Japan, South Africa
CVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
Description
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.9.4. This is due to insufficient capability checks in the REST API endpoints under the 'fl-controls/v1' namespace that control site-wide Global Presets. This makes it possible for authenticated attackers with contributor-level access and above to add, modify, or delete global color and background presets that affect all Beaver Builder content site-wide.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11726 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Beaver Builder Page Builder plugin for WordPress, specifically in all versions up to and including 2.9.4. The root cause is insufficient capability checks in REST API endpoints within the 'fl-controls/v1' namespace, which manage site-wide Global Presets such as colors and backgrounds. These endpoints fail to properly verify whether the authenticated user has the necessary permissions to modify these global settings. Consequently, any authenticated user with contributor-level privileges or higher can add, modify, or delete global color and background presets. This manipulation affects the entire site’s Beaver Builder content, potentially altering the visual integrity and user experience across all pages built with the plugin. The vulnerability requires authentication but no user interaction beyond that. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope of impact (integrity only), ease of exploitation (low complexity), and the requirement for authenticated access with privileges. No known exploits have been reported in the wild as of the publication date. The vulnerability does not impact confidentiality or availability directly but can be leveraged for defacement or misleading site appearance changes. The lack of patch links suggests that a fix may be pending or users should monitor vendor advisories closely.
Potential Impact
The primary impact of CVE-2025-11726 is on the integrity of website content managed by Beaver Builder. An attacker with contributor-level access can alter global presets, which affects the visual styling of all pages using Beaver Builder, potentially leading to site defacement or brand damage. While this does not expose sensitive data or cause service outages, it undermines trust and user experience. Organizations relying on Beaver Builder for their WordPress sites, especially those with multiple contributors or editors, face a risk of unauthorized content manipulation. This could be exploited in targeted attacks to mislead visitors or disrupt marketing and communication efforts. The vulnerability’s requirement for authenticated access limits exposure but does not eliminate risk in environments with many contributors or where credentials might be compromised. No direct availability or confidentiality impact reduces the severity but does not negate the reputational and operational risks involved.
Mitigation Recommendations
To mitigate CVE-2025-11726, organizations should first verify if they are running Beaver Builder versions up to 2.9.4 and plan for immediate updates once patches are released by the vendor. In the absence of an official patch, administrators should restrict contributor-level access and above to trusted users only, minimizing the attack surface. Implement strict role-based access controls and audit user permissions regularly to ensure no unnecessary privileges are granted. Monitoring REST API usage and logging changes to global presets can help detect suspicious activity early. Additionally, consider implementing Web Application Firewalls (WAF) rules to monitor and potentially block unauthorized REST API calls targeting the 'fl-controls/v1' namespace. Educate contributors about the risks of credential compromise and enforce strong authentication mechanisms such as MFA to reduce the likelihood of unauthorized access. Finally, maintain regular backups of site configurations and presets to enable rapid restoration if unauthorized changes occur.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-13T21:41:33.879Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e98935ae71122648fbfaa
Added to database: 12/2/2025, 7:43:15 AM
Last enriched: 2/27/2026, 7:13:13 PM
Last updated: 3/26/2026, 7:42:55 AM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.