CVE-2025-11877: CWE-862 Missing Authorization in solwininfotech User Activity Log
The User Activity Log plugin is vulnerable to a limited options update in versions up to, and including, 2.2. The failed-login handler 'ual_shook_wp_login_failed' lacks a capability check and writes failed usernames directly into update_option() calls. This makes it possible for unauthenticated attackers to push select site options from 0 to a non-zero value, allowing them to reopen registration or corrupt options like 'wp_user_roles', breaking wp-admin access.
AI Analysis
Technical Summary
CVE-2025-11877 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the solwininfotech User Activity Log WordPress plugin, specifically versions up to and including 2.2. The issue stems from the failed-login handler function 'ual_shook_wp_login_failed', which lacks proper capability checks before executing update_option() calls. This function writes failed login usernames directly into site options without verifying if the requester is authorized. As a result, unauthenticated attackers can manipulate certain site options by pushing their values from zero to non-zero. This manipulation can reopen user registration on the site or corrupt critical options like 'wp_user_roles', which define user roles and capabilities within WordPress. Corruption of 'wp_user_roles' can break administrative access, effectively locking out legitimate administrators from the wp-admin dashboard. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of exploitation and the high impact on integrity, though confidentiality and availability are not directly affected. No patches or official fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The vulnerability was reserved in October 2025 and published in January 2026. Given the widespread use of WordPress and the popularity of activity log plugins, this vulnerability poses a significant threat to affected sites.
Potential Impact
The primary impact of CVE-2025-11877 is on the integrity of WordPress site configurations. By allowing unauthenticated attackers to modify site options, the vulnerability can lead to unauthorized reopening of user registrations, enabling attackers to create accounts or escalate privileges. More critically, corruption of the 'wp_user_roles' option can disable or alter user roles and permissions, potentially locking out legitimate administrators and preventing site management. This can result in prolonged site downtime, loss of administrative control, and increased risk of further compromise. Although confidentiality and availability are not directly impacted, the loss of administrative access can indirectly affect site availability and security posture. Organizations relying on the affected plugin face risks of unauthorized configuration changes, potential privilege escalation, and operational disruption. The ease of remote exploitation without authentication increases the likelihood of attacks, especially on sites with public-facing login pages. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop weaponized exploits.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the solwininfotech User Activity Log plugin until an official patch is released. 2. Monitor WordPress plugin repositories and vendor communications for updates or patches addressing CVE-2025-11877 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to block or rate-limit requests targeting the failed-login handler or suspicious update_option() calls, especially those attempting to modify site options without authentication. 4. Restrict access to wp-admin and login endpoints using IP whitelisting or VPN access where feasible to reduce exposure. 5. Regularly back up WordPress site configurations, including the database, to enable quick restoration of 'wp_user_roles' and other critical options if corrupted. 6. Audit site options and user roles frequently to detect unauthorized changes early. 7. Employ intrusion detection systems (IDS) to monitor for anomalous activity related to option updates. 8. Educate site administrators about this vulnerability and encourage vigilance regarding unexpected changes in user registration settings or administrative access issues. 9. Consider deploying security plugins that enforce capability checks or harden option update mechanisms as an interim protective measure.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2025-11877: CWE-862 Missing Authorization in solwininfotech User Activity Log
Description
The User Activity Log plugin is vulnerable to a limited options update in versions up to, and including, 2.2. The failed-login handler 'ual_shook_wp_login_failed' lacks a capability check and writes failed usernames directly into update_option() calls. This makes it possible for unauthenticated attackers to push select site options from 0 to a non-zero value, allowing them to reopen registration or corrupt options like 'wp_user_roles', breaking wp-admin access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11877 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the solwininfotech User Activity Log WordPress plugin, specifically versions up to and including 2.2. The issue stems from the failed-login handler function 'ual_shook_wp_login_failed', which lacks proper capability checks before executing update_option() calls. This function writes failed login usernames directly into site options without verifying if the requester is authorized. As a result, unauthenticated attackers can manipulate certain site options by pushing their values from zero to non-zero. This manipulation can reopen user registration on the site or corrupt critical options like 'wp_user_roles', which define user roles and capabilities within WordPress. Corruption of 'wp_user_roles' can break administrative access, effectively locking out legitimate administrators from the wp-admin dashboard. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of exploitation and the high impact on integrity, though confidentiality and availability are not directly affected. No patches or official fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The vulnerability was reserved in October 2025 and published in January 2026. Given the widespread use of WordPress and the popularity of activity log plugins, this vulnerability poses a significant threat to affected sites.
Potential Impact
The primary impact of CVE-2025-11877 is on the integrity of WordPress site configurations. By allowing unauthenticated attackers to modify site options, the vulnerability can lead to unauthorized reopening of user registrations, enabling attackers to create accounts or escalate privileges. More critically, corruption of the 'wp_user_roles' option can disable or alter user roles and permissions, potentially locking out legitimate administrators and preventing site management. This can result in prolonged site downtime, loss of administrative control, and increased risk of further compromise. Although confidentiality and availability are not directly impacted, the loss of administrative access can indirectly affect site availability and security posture. Organizations relying on the affected plugin face risks of unauthorized configuration changes, potential privilege escalation, and operational disruption. The ease of remote exploitation without authentication increases the likelihood of attacks, especially on sites with public-facing login pages. The absence of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop weaponized exploits.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the solwininfotech User Activity Log plugin until an official patch is released. 2. Monitor WordPress plugin repositories and vendor communications for updates or patches addressing CVE-2025-11877 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to block or rate-limit requests targeting the failed-login handler or suspicious update_option() calls, especially those attempting to modify site options without authentication. 4. Restrict access to wp-admin and login endpoints using IP whitelisting or VPN access where feasible to reduce exposure. 5. Regularly back up WordPress site configurations, including the database, to enable quick restoration of 'wp_user_roles' and other critical options if corrupted. 6. Audit site options and user roles frequently to detect unauthorized changes early. 7. Employ intrusion detection systems (IDS) to monitor for anomalous activity related to option updates. 8. Educate site administrators about this vulnerability and encourage vigilance regarding unexpected changes in user registration settings or administrative access issues. 9. Consider deploying security plugins that enforce capability checks or harden option update mechanisms as an interim protective measure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-16T17:17:27.672Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e1b2fa55ed4ed998cb627
Added to database: 1/7/2026, 8:37:03 AM
Last enriched: 2/27/2026, 7:35:58 PM
Last updated: 3/24/2026, 12:49:22 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.