CVE-2025-12027: CWE-862 Missing Authorization in horearadu Mesmerize Companion
The Mesmerize Companion plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the "openPageInCustomizer" and "openPageInDefaultEditor" functions in all versions up to, and including, 1.6.158. This makes it possible for authenticated attackers - with subscriber level access and above, on websites with the Mesmerize theme activated - to mark arbitrary pages as maintainable, wrap their content in custom sections, change page template metadata, and toggle the default editor flag without proper authorization.
AI Analysis
Technical Summary
CVE-2025-12027 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Mesmerize Companion plugin for WordPress, specifically in all versions up to 1.6.158. The issue arises because the plugin fails to perform proper capability checks in the functions openPageInCustomizer and openPageInDefaultEditor. These functions are responsible for enabling page editing features such as marking pages as maintainable, wrapping content in custom sections, changing page template metadata, and toggling the default editor flag. The lack of authorization checks means that any authenticated user with subscriber-level access or higher can exploit these functions to modify page content and metadata without the necessary permissions. This can lead to unauthorized content changes that may affect the integrity of the website’s content and presentation. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity of the system (I:L) but not confidentiality or availability. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No patches have been released at the time of reporting, and no known exploits are currently in the wild. The vulnerability is relevant to websites using the Mesmerize theme with the Mesmerize Companion plugin installed, which is a popular theme/plugin combination for WordPress sites focusing on customizable page layouts.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of website content and metadata. Unauthorized modifications could lead to misinformation, defacement, or unauthorized content injection, potentially damaging brand reputation and user trust. Although the vulnerability does not directly expose confidential data or cause denial of service, the ability to alter page templates and content could be leveraged for phishing, misinformation campaigns, or to facilitate further attacks such as privilege escalation or malware distribution. Organizations relying on WordPress sites with the Mesmerize theme and plugin are at risk, especially those with subscriber-level user registrations or other low-privilege user roles that could be compromised or misused. The impact is more pronounced for public-facing websites, e-commerce platforms, and government or critical infrastructure sites where content integrity is crucial. Given the medium CVSS score and the requirement for authenticated access, the threat is moderate but should not be underestimated in environments with many low-privilege users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Mesmerize Companion plugin and the Mesmerize theme. Until an official patch is released, administrators should restrict subscriber-level user capabilities to the minimum necessary, potentially disabling or limiting page editing features for low-privilege users. Implementing strict user role management and monitoring for unusual page modifications can help detect exploitation attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Regularly review user accounts and remove or disable inactive or suspicious accounts to reduce the attack surface. Organizations should also subscribe to vendor and security mailing lists to receive timely updates and apply patches as soon as they become available. Consider deploying integrity monitoring tools to alert on unauthorized changes to page content and metadata. Finally, educate content managers and administrators about this vulnerability and the importance of access control hygiene.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12027: CWE-862 Missing Authorization in horearadu Mesmerize Companion
Description
The Mesmerize Companion plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the "openPageInCustomizer" and "openPageInDefaultEditor" functions in all versions up to, and including, 1.6.158. This makes it possible for authenticated attackers - with subscriber level access and above, on websites with the Mesmerize theme activated - to mark arbitrary pages as maintainable, wrap their content in custom sections, change page template metadata, and toggle the default editor flag without proper authorization.
AI-Powered Analysis
Technical Analysis
CVE-2025-12027 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Mesmerize Companion plugin for WordPress, specifically in all versions up to 1.6.158. The issue arises because the plugin fails to perform proper capability checks in the functions openPageInCustomizer and openPageInDefaultEditor. These functions are responsible for enabling page editing features such as marking pages as maintainable, wrapping content in custom sections, changing page template metadata, and toggling the default editor flag. The lack of authorization checks means that any authenticated user with subscriber-level access or higher can exploit these functions to modify page content and metadata without the necessary permissions. This can lead to unauthorized content changes that may affect the integrity of the website’s content and presentation. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity of the system (I:L) but not confidentiality or availability. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No patches have been released at the time of reporting, and no known exploits are currently in the wild. The vulnerability is relevant to websites using the Mesmerize theme with the Mesmerize Companion plugin installed, which is a popular theme/plugin combination for WordPress sites focusing on customizable page layouts.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of website content and metadata. Unauthorized modifications could lead to misinformation, defacement, or unauthorized content injection, potentially damaging brand reputation and user trust. Although the vulnerability does not directly expose confidential data or cause denial of service, the ability to alter page templates and content could be leveraged for phishing, misinformation campaigns, or to facilitate further attacks such as privilege escalation or malware distribution. Organizations relying on WordPress sites with the Mesmerize theme and plugin are at risk, especially those with subscriber-level user registrations or other low-privilege user roles that could be compromised or misused. The impact is more pronounced for public-facing websites, e-commerce platforms, and government or critical infrastructure sites where content integrity is crucial. Given the medium CVSS score and the requirement for authenticated access, the threat is moderate but should not be underestimated in environments with many low-privilege users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Mesmerize Companion plugin and the Mesmerize theme. Until an official patch is released, administrators should restrict subscriber-level user capabilities to the minimum necessary, potentially disabling or limiting page editing features for low-privilege users. Implementing strict user role management and monitoring for unusual page modifications can help detect exploitation attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Regularly review user accounts and remove or disable inactive or suspicious accounts to reduce the attack surface. Organizations should also subscribe to vendor and security mailing lists to receive timely updates and apply patches as soon as they become available. Consider deploying integrity monitoring tools to alert on unauthorized changes to page content and metadata. Finally, educate content managers and administrators about this vulnerability and the importance of access control hygiene.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-21T15:18:05.634Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69968d636aea4a407a3900c0
Added to database: 2/19/2026, 4:11:15 AM
Last enriched: 2/19/2026, 4:30:42 AM
Last updated: 2/21/2026, 12:18:23 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.