Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12005: CWE-285 Improper Authorization in rextheme WP VR – 360 Panorama and Free Virtual Tour Builder For WordPress

0
Medium
VulnerabilityCVE-2025-12005cvecve-2025-12005cwe-285
Published: Sat Oct 25 2025 (10/25/2025, 05:31:23 UTC)
Source: CVE Database V5
Vendor/Project: rextheme
Product: WP VR – 360 Panorama and Free Virtual Tour Builder For WordPress

Description

The WP VR – 360 Panorama and Free Virtual Tour Builder For WordPress plugin for WordPress is vulnerable to unauthorized access of data in all versions up to, and including, 8.5.41. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with contributor level access and above, to modify sensitive plugin options.

AI-Powered Analysis

AILast updated: 10/25/2025, 06:58:24 UTC

Technical Analysis

CVE-2025-12005 is an authorization vulnerability categorized under CWE-285 affecting the WP VR – 360 Panorama and Free Virtual Tour Builder plugin for WordPress developed by rextheme. The vulnerability exists because the plugin fails to properly verify that a user is authorized to perform certain actions, specifically modifying sensitive plugin options. This flaw allows any authenticated user with contributor-level access or higher to bypass intended permission checks and alter plugin configurations. Since contributors typically have limited capabilities, this elevation of privileges within the plugin context can lead to unauthorized changes that may affect the plugin's behavior or site functionality. The vulnerability is exploitable remotely over the network without user interaction, increasing its risk profile. The CVSS v3.1 base score is 4.3 (medium), reflecting low impact on confidentiality and availability but a moderate impact on integrity. No patches or known exploits are currently available, and the issue affects all plugin versions up to 8.5.41. The vulnerability was published on October 25, 2025, and assigned by Wordfence. The lack of proper authorization checks is a common security oversight that can be exploited by attackers who have already gained contributor-level access, emphasizing the importance of strict role-based access controls and plugin security.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the affected plugin. Unauthorized modification of plugin options could lead to altered site behavior, potential exposure of sensitive data through misconfiguration, or facilitation of further attacks if the plugin controls critical site functions. Organizations relying on contributors or editors to manage content are particularly vulnerable since these roles can exploit the flaw. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can undermine trust in the affected websites and potentially disrupt business operations or user experience. Given the widespread use of WordPress in Europe, especially in countries with large digital economies and active online presence, the threat could affect a significant number of sites. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Attackers with contributor access could leverage this flaw to escalate privileges within the plugin context, potentially leading to more severe attacks.

Mitigation Recommendations

1. Monitor the plugin vendor's announcements closely and apply security patches immediately once available. 2. Until a patch is released, restrict contributor and higher-level user privileges to only trusted personnel. 3. Implement strict role-based access controls in WordPress to minimize the number of users with contributor or higher roles. 4. Regularly audit plugin option changes and WordPress user activities to detect unauthorized modifications early. 5. Consider temporarily disabling or replacing the WP VR plugin if it is not critical to operations. 6. Employ Web Application Firewalls (WAFs) with rules to detect anomalous requests targeting plugin options. 7. Educate site administrators and content managers about the risks of elevated privileges and encourage strong password policies and multi-factor authentication to reduce the risk of account compromise. 8. Review and harden WordPress security configurations overall to limit the impact of compromised user accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T06:47:47.169Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd7617

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 10/25/2025, 6:58:24 AM

Last updated: 10/30/2025, 2:02:17 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats