Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11816: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

0
Medium
VulnerabilityCVE-2025-11816cvecve-2025-11816cwe-862
Published: Sat Nov 01 2025 (11/01/2025, 01:47:40 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

Description

The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan.

AI-Powered Analysis

AILast updated: 11/08/2025, 02:26:45 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11816 affects the WP Legal Pages WordPress plugin, specifically versions up to and including 3.5.1. This plugin is used to generate Privacy Policy and Terms & Conditions pages for WordPress websites. The core issue is a missing authorization check (CWE-862) in the disconnect_account_request() function, which is responsible for disconnecting the site from its associated API plan. Due to the lack of capability verification, an unauthenticated attacker can invoke this function remotely without any credentials or user interaction, causing the site to lose its connection to the API plan. This unauthorized modification does not expose confidential data or cause denial of service but can disrupt the plugin’s intended operation, potentially impacting the site's legal compliance documentation management. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network vector, no privileges required) but limited impact on confidentiality and availability. No patches or official fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability requires immediate attention from site administrators using this plugin to prevent unauthorized disconnection from the API, which could lead to compliance risks or degraded site functionality related to legal pages.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of site management functions related to legal compliance documentation. Unauthorized disconnection from the API plan could disable or impair automated updates or management of Privacy Policy and Terms & Conditions pages, potentially leading to outdated or non-compliant legal notices on websites. This could result in regulatory scrutiny or penalties under GDPR and other European data protection laws. While the vulnerability does not directly compromise user data confidentiality or site availability, the disruption of legal page management can have indirect reputational and compliance impacts. Organizations relying on WP Legal Pages for maintaining up-to-date legal documents on their websites are particularly vulnerable. The ease of exploitation without authentication means attackers can target multiple sites at scale, increasing the risk of widespread disruption. European companies with strong regulatory oversight and high web presence are at greater risk of operational and compliance impacts.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the disconnect_account_request() function by implementing custom authorization checks or firewall rules to block unauthenticated requests targeting this endpoint. Administrators should audit web server and plugin logs for suspicious requests attempting to invoke this function. Disabling or temporarily removing the WP Legal Pages plugin until a patch is released is advisable for high-risk environments. Additionally, organizations should monitor updates from the plugin vendor and apply patches promptly once available. Employing Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts can provide an additional layer of defense. Finally, organizations should review their legal page management processes to ensure manual oversight in case automated API connections are disrupted.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-15T16:49:42.300Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690567f271a6fc4aff36b3e7

Added to database: 11/1/2025, 1:52:50 AM

Last enriched: 11/8/2025, 2:26:45 AM

Last updated: 12/16/2025, 6:32:30 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats