CVE-2025-11734: CWE-862 Missing Authorization in aioseo Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links
The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization in all versions up to, and including, 1.2.5. This is due to the plugin registering a REST API endpoint that only checks for a broad capability (aioseo_blc_broken_links_page) that is granted to contributor level users, without verifying the user's permission to perform actions on the specific post being targeted. This makes it possible for authenticated attackers, with contributor level access and above, to trash arbitrary posts via the DELETE /wp-json/aioseoBrokenLinkChecker/v1/post endpoint.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11734 affects the Broken Link Checker plugin by AIOSEO for WordPress, versions up to and including 1.2.5. The root cause is a missing authorization check in a REST API endpoint (/wp-json/aioseoBrokenLinkChecker/v1/post) that allows authenticated users with contributor-level permissions or higher to delete (trash) arbitrary posts. The plugin verifies only a broad capability (aioseo_blc_broken_links_page) which contributors possess, but fails to verify if the user has permission to modify the specific post targeted by the DELETE request. This CWE-862 (Missing Authorization) vulnerability enables privilege escalation within the scope of contributor-level access, permitting unauthorized post modification. The CVSS 3.1 score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability. Although no exploits are currently known in the wild, the vulnerability could be leveraged by malicious insiders or compromised contributor accounts to disrupt content integrity or availability on affected WordPress sites. The vulnerability affects all plugin versions up to 1.2.5, with no patch links currently available, emphasizing the need for immediate mitigation.
Potential Impact
This vulnerability can lead to unauthorized deletion (trashing) of posts by users who should not have such permissions, undermining content integrity and availability on affected WordPress sites. Organizations relying on the Broken Link Checker plugin may face content loss or disruption, impacting website reliability and user trust. Since contributor-level users are commonly assigned to content creators or editors, a compromised or malicious contributor account could exploit this flaw to delete critical posts or disrupt site operations. This can affect businesses, media outlets, educational institutions, and any entity using WordPress with this plugin. The impact is particularly significant for sites with multiple contributors and less stringent user management policies. Although confidentiality is not directly impacted, the integrity and availability of content are at risk, potentially causing reputational damage and operational downtime.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions, restricting contributor-level access to trusted users only. Until an official patch is released, consider disabling or uninstalling the Broken Link Checker plugin if contributor-level users exist. Implement additional access controls or custom authorization checks on the REST API endpoints via WordPress hooks or security plugins to enforce post-level permissions. Monitor logs for suspicious DELETE requests to the affected endpoint. Regularly update the plugin once a patch becomes available. Employ the principle of least privilege for user roles and consider multi-factor authentication to reduce the risk of compromised contributor accounts. Additionally, maintain regular backups of WordPress content to enable recovery from unauthorized deletions.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2025-11734: CWE-862 Missing Authorization in aioseo Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links
Description
The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization in all versions up to, and including, 1.2.5. This is due to the plugin registering a REST API endpoint that only checks for a broad capability (aioseo_blc_broken_links_page) that is granted to contributor level users, without verifying the user's permission to perform actions on the specific post being targeted. This makes it possible for authenticated attackers, with contributor level access and above, to trash arbitrary posts via the DELETE /wp-json/aioseoBrokenLinkChecker/v1/post endpoint.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-11734 affects the Broken Link Checker plugin by AIOSEO for WordPress, versions up to and including 1.2.5. The root cause is a missing authorization check in a REST API endpoint (/wp-json/aioseoBrokenLinkChecker/v1/post) that allows authenticated users with contributor-level permissions or higher to delete (trash) arbitrary posts. The plugin verifies only a broad capability (aioseo_blc_broken_links_page) which contributors possess, but fails to verify if the user has permission to modify the specific post targeted by the DELETE request. This CWE-862 (Missing Authorization) vulnerability enables privilege escalation within the scope of contributor-level access, permitting unauthorized post modification. The CVSS 3.1 score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity and availability. Although no exploits are currently known in the wild, the vulnerability could be leveraged by malicious insiders or compromised contributor accounts to disrupt content integrity or availability on affected WordPress sites. The vulnerability affects all plugin versions up to 1.2.5, with no patch links currently available, emphasizing the need for immediate mitigation.
Potential Impact
This vulnerability can lead to unauthorized deletion (trashing) of posts by users who should not have such permissions, undermining content integrity and availability on affected WordPress sites. Organizations relying on the Broken Link Checker plugin may face content loss or disruption, impacting website reliability and user trust. Since contributor-level users are commonly assigned to content creators or editors, a compromised or malicious contributor account could exploit this flaw to delete critical posts or disrupt site operations. This can affect businesses, media outlets, educational institutions, and any entity using WordPress with this plugin. The impact is particularly significant for sites with multiple contributors and less stringent user management policies. Although confidentiality is not directly impacted, the integrity and availability of content are at risk, potentially causing reputational damage and operational downtime.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions, restricting contributor-level access to trusted users only. Until an official patch is released, consider disabling or uninstalling the Broken Link Checker plugin if contributor-level users exist. Implement additional access controls or custom authorization checks on the REST API endpoints via WordPress hooks or security plugins to enforce post-level permissions. Monitor logs for suspicious DELETE requests to the affected endpoint. Regularly update the plugin once a patch becomes available. Employ the principle of least privilege for user roles and consider multi-factor authentication to reduce the risk of compromised contributor accounts. Additionally, maintain regular backups of WordPress content to enable recovery from unauthorized deletions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T10:08:30.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c3e32a312a743bb510b75
Added to database: 11/18/2025, 9:36:50 AM
Last enriched: 2/27/2026, 7:15:02 PM
Last updated: 3/24/2026, 1:13:25 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.