Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11816: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

0
Medium
VulnerabilityCVE-2025-11816cvecve-2025-11816cwe-862
Published: Sat Nov 01 2025 (11/01/2025, 01:47:40 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

Description

The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan.

AI-Powered Analysis

AILast updated: 11/01/2025, 02:08:22 UTC

Technical Analysis

CVE-2025-11816 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Legal Pages WordPress plugin, which provides Privacy Policy and Terms & Conditions generation functionalities. The flaw exists in the disconnect_account_request() function, which lacks proper capability checks to verify if the requester is authorized to perform the action. This omission allows unauthenticated attackers to invoke this function remotely and disconnect the WordPress site from its associated API plan. The impact is limited to unauthorized modification of plugin-related data, specifically the disconnection from the API service, which could disrupt the plugin’s ability to update or manage legal pages automatically. The vulnerability affects all versions up to and including 3.5.1. The CVSS v3.1 base score is 5.3, indicating medium severity, with an attack vector of network (remote), no privileges required, no user interaction, and an impact limited to integrity (unauthorized modification) without affecting confidentiality or availability. No patches or exploit code are currently known, but the ease of exploitation and lack of authentication requirements make it a notable risk for sites relying on this plugin. The vulnerability was publicly disclosed on November 1, 2025, with no immediate remediation available at that time.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disruption of legal compliance functionalities on WordPress sites using the WP Legal Pages plugin. While it does not expose sensitive data or cause denial of service, disconnecting the site from its API plan may prevent automatic updates or management of privacy policies and terms, potentially leading to non-compliance with evolving legal requirements such as GDPR. This could result in regulatory scrutiny or reputational damage. Organizations relying heavily on automated legal page management may experience operational inefficiencies. The risk is particularly relevant for sectors with strict compliance needs, including finance, healthcare, and e-commerce. Since exploitation requires no authentication and can be performed remotely, attackers could target multiple sites en masse, increasing the threat surface. However, the absence of known exploits in the wild and the medium severity rating suggest the impact is moderate but should not be ignored.

Mitigation Recommendations

1. Monitor the WP Legal Pages plugin repository and official channels for security updates or patches addressing CVE-2025-11816 and apply them promptly once available. 2. Implement strict access controls on WordPress administrative endpoints, including limiting access by IP address and enforcing strong authentication mechanisms to reduce exposure. 3. Deploy a Web Application Firewall (WAF) with custom rules to detect and block unauthorized requests targeting the disconnect_account_request() function or related API endpoints. 4. Conduct regular security audits and plugin reviews to identify and mitigate similar missing authorization issues proactively. 5. Consider temporarily disabling or replacing the WP Legal Pages plugin with alternative solutions that have verified security postures until a patch is released. 6. Educate site administrators about the risks of unauthorized plugin modifications and encourage monitoring of plugin behavior and logs for suspicious activity. 7. Use WordPress security plugins that can detect anomalous API calls or unauthorized configuration changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-15T16:49:42.300Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690567f271a6fc4aff36b3e7

Added to database: 11/1/2025, 1:52:50 AM

Last enriched: 11/1/2025, 2:08:22 AM

Last updated: 11/1/2025, 4:31:00 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats