Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11734: CWE-862 Missing Authorization in aioseo Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links

0
Medium
VulnerabilityCVE-2025-11734cvecve-2025-11734cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 09:27:35 UTC)
Source: CVE Database V5
Vendor/Project: aioseo
Product: Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links

Description

The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization in all versions up to, and including, 1.2.5. This is due to the plugin registering a REST API endpoint that only checks for a broad capability (aioseo_blc_broken_links_page) that is granted to contributor level users, without verifying the user's permission to perform actions on the specific post being targeted. This makes it possible for authenticated attackers, with contributor level access and above, to trash arbitrary posts via the DELETE /wp-json/aioseoBrokenLinkChecker/v1/post endpoint.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:15:02 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11734 affects the Broken Link Checker plugin by AIOSEO for WordPress, versions up to and including 1.2.5. The root cause is a missing authorization check in a REST API endpoint (/wp-json/aioseoBrokenLinkChecker/v1/post) that allows authenticated users with contributor-level permissions or higher to delete (trash) arbitrary posts. The plugin verifies only a broad capability (aioseo_blc_broken_links_page) which contributors possess, but fails to verify if the user has permission to modify the specific post targeted by the DELETE request. This CWE-862 (Missing Authorization) vulnerability enables privilege escalation within the scope of contributor-level access, permitting unauthorized post modification. The CVSS 3.1 score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability. Although no exploits are currently known in the wild, the vulnerability could be leveraged by malicious insiders or compromised contributor accounts to disrupt content integrity or availability on affected WordPress sites. The vulnerability affects all plugin versions up to 1.2.5, with no patch links currently available, emphasizing the need for immediate mitigation.

Potential Impact

This vulnerability can lead to unauthorized deletion (trashing) of posts by users who should not have such permissions, undermining content integrity and availability on affected WordPress sites. Organizations relying on the Broken Link Checker plugin may face content loss or disruption, impacting website reliability and user trust. Since contributor-level users are commonly assigned to content creators or editors, a compromised or malicious contributor account could exploit this flaw to delete critical posts or disrupt site operations. This can affect businesses, media outlets, educational institutions, and any entity using WordPress with this plugin. The impact is particularly significant for sites with multiple contributors and less stringent user management policies. Although confidentiality is not directly impacted, the integrity and availability of content are at risk, potentially causing reputational damage and operational downtime.

Mitigation Recommendations

Organizations should immediately audit user roles and permissions, restricting contributor-level access to trusted users only. Until an official patch is released, consider disabling or uninstalling the Broken Link Checker plugin if contributor-level users exist. Implement additional access controls or custom authorization checks on the REST API endpoints via WordPress hooks or security plugins to enforce post-level permissions. Monitor logs for suspicious DELETE requests to the affected endpoint. Regularly update the plugin once a patch becomes available. Employ the principle of least privilege for user roles and consider multi-factor authentication to reduce the risk of compromised contributor accounts. Additionally, maintain regular backups of WordPress content to enable recovery from unauthorized deletions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T10:08:30.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c3e32a312a743bb510b75

Added to database: 11/18/2025, 9:36:50 AM

Last enriched: 2/27/2026, 7:15:02 PM

Last updated: 3/25/2026, 7:09:43 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses