CVE-2025-11816: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages
The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan.
AI Analysis
Technical Summary
CVE-2025-11816 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Legal Pages WordPress plugin, which provides Privacy Policy and Terms & Conditions generation functionalities. The flaw exists in the disconnect_account_request() function, which lacks proper capability checks to verify if the requester is authorized to perform the action. This omission allows unauthenticated attackers to invoke this function remotely and disconnect the WordPress site from its associated API plan. The impact is limited to unauthorized modification of plugin-related data, specifically the disconnection from the API service, which could disrupt the plugin’s ability to update or manage legal pages automatically. The vulnerability affects all versions up to and including 3.5.1. The CVSS v3.1 base score is 5.3, indicating medium severity, with an attack vector of network (remote), no privileges required, no user interaction, and an impact limited to integrity (unauthorized modification) without affecting confidentiality or availability. No patches or exploit code are currently known, but the ease of exploitation and lack of authentication requirements make it a notable risk for sites relying on this plugin. The vulnerability was publicly disclosed on November 1, 2025, with no immediate remediation available at that time.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disruption of legal compliance functionalities on WordPress sites using the WP Legal Pages plugin. While it does not expose sensitive data or cause denial of service, disconnecting the site from its API plan may prevent automatic updates or management of privacy policies and terms, potentially leading to non-compliance with evolving legal requirements such as GDPR. This could result in regulatory scrutiny or reputational damage. Organizations relying heavily on automated legal page management may experience operational inefficiencies. The risk is particularly relevant for sectors with strict compliance needs, including finance, healthcare, and e-commerce. Since exploitation requires no authentication and can be performed remotely, attackers could target multiple sites en masse, increasing the threat surface. However, the absence of known exploits in the wild and the medium severity rating suggest the impact is moderate but should not be ignored.
Mitigation Recommendations
1. Monitor the WP Legal Pages plugin repository and official channels for security updates or patches addressing CVE-2025-11816 and apply them promptly once available. 2. Implement strict access controls on WordPress administrative endpoints, including limiting access by IP address and enforcing strong authentication mechanisms to reduce exposure. 3. Deploy a Web Application Firewall (WAF) with custom rules to detect and block unauthorized requests targeting the disconnect_account_request() function or related API endpoints. 4. Conduct regular security audits and plugin reviews to identify and mitigate similar missing authorization issues proactively. 5. Consider temporarily disabling or replacing the WP Legal Pages plugin with alternative solutions that have verified security postures until a patch is released. 6. Educate site administrators about the risks of unauthorized plugin modifications and encourage monitoring of plugin behavior and logs for suspicious activity. 7. Use WordPress security plugins that can detect anomalous API calls or unauthorized configuration changes.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-11816: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages
Description
The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan.
AI-Powered Analysis
Technical Analysis
CVE-2025-11816 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Legal Pages WordPress plugin, which provides Privacy Policy and Terms & Conditions generation functionalities. The flaw exists in the disconnect_account_request() function, which lacks proper capability checks to verify if the requester is authorized to perform the action. This omission allows unauthenticated attackers to invoke this function remotely and disconnect the WordPress site from its associated API plan. The impact is limited to unauthorized modification of plugin-related data, specifically the disconnection from the API service, which could disrupt the plugin’s ability to update or manage legal pages automatically. The vulnerability affects all versions up to and including 3.5.1. The CVSS v3.1 base score is 5.3, indicating medium severity, with an attack vector of network (remote), no privileges required, no user interaction, and an impact limited to integrity (unauthorized modification) without affecting confidentiality or availability. No patches or exploit code are currently known, but the ease of exploitation and lack of authentication requirements make it a notable risk for sites relying on this plugin. The vulnerability was publicly disclosed on November 1, 2025, with no immediate remediation available at that time.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disruption of legal compliance functionalities on WordPress sites using the WP Legal Pages plugin. While it does not expose sensitive data or cause denial of service, disconnecting the site from its API plan may prevent automatic updates or management of privacy policies and terms, potentially leading to non-compliance with evolving legal requirements such as GDPR. This could result in regulatory scrutiny or reputational damage. Organizations relying heavily on automated legal page management may experience operational inefficiencies. The risk is particularly relevant for sectors with strict compliance needs, including finance, healthcare, and e-commerce. Since exploitation requires no authentication and can be performed remotely, attackers could target multiple sites en masse, increasing the threat surface. However, the absence of known exploits in the wild and the medium severity rating suggest the impact is moderate but should not be ignored.
Mitigation Recommendations
1. Monitor the WP Legal Pages plugin repository and official channels for security updates or patches addressing CVE-2025-11816 and apply them promptly once available. 2. Implement strict access controls on WordPress administrative endpoints, including limiting access by IP address and enforcing strong authentication mechanisms to reduce exposure. 3. Deploy a Web Application Firewall (WAF) with custom rules to detect and block unauthorized requests targeting the disconnect_account_request() function or related API endpoints. 4. Conduct regular security audits and plugin reviews to identify and mitigate similar missing authorization issues proactively. 5. Consider temporarily disabling or replacing the WP Legal Pages plugin with alternative solutions that have verified security postures until a patch is released. 6. Educate site administrators about the risks of unauthorized plugin modifications and encourage monitoring of plugin behavior and logs for suspicious activity. 7. Use WordPress security plugins that can detect anomalous API calls or unauthorized configuration changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-15T16:49:42.300Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690567f271a6fc4aff36b3e7
Added to database: 11/1/2025, 1:52:50 AM
Last enriched: 11/1/2025, 2:08:22 AM
Last updated: 11/1/2025, 4:31:00 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12367: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
MediumCVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
MediumCVE-2025-11833: CWE-862 Missing Authorization in saadiqbal Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App
CriticalCVE-2025-62275: CWE-863: Incorrect Authorization in Liferay Portal
MediumCVE-2025-11922: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in j_3rk Inactive Logout
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.