CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images
The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
AI Analysis
Technical Summary
CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' developed by webtoffee. The vulnerability exists in all versions up to and including 1.8.3. Specifically, the function atgai_delete_api_key() lacks proper capability checks, enabling any authenticated user with at least Subscriber-level privileges to invoke this function and delete the API key associated with the plugin. The API key is critical for the plugin's operation, as it likely facilitates communication with external AI services for generating alt text. By deleting this key, an attacker can disrupt the plugin's ability to auto-generate or bulk update alt texts, impacting website accessibility and SEO. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. There is no confidentiality or availability impact, but integrity is affected due to unauthorized modification of the API key. No known exploits have been reported, and no patches have been released at the time of publication. The vulnerability was reserved on 2025-10-23 and published on 2025-11-12. The plugin is used on WordPress sites, which are widespread globally, including Europe. The vulnerability could be exploited by malicious insiders or compromised accounts with Subscriber or higher privileges to degrade site functionality.
Potential Impact
For European organizations, the primary impact is operational disruption of the alt text generation functionality on WordPress sites using this plugin. This can affect website accessibility compliance, SEO rankings, and user experience, especially for organizations relying on automated alt text for large image repositories. While the vulnerability does not expose sensitive data or cause denial of service, the loss of the API key could require administrative intervention to restore plugin functionality, increasing operational overhead. Organizations with multiple users having Subscriber or higher roles are at increased risk, as any such user could exploit this flaw. This vulnerability could be leveraged in targeted attacks to degrade web presence or accessibility compliance, which is critical under EU regulations such as the Web Accessibility Directive. Although no direct data breach risk exists, the integrity loss and potential disruption could indirectly affect trust and compliance posture.
Mitigation Recommendations
1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking plugin functions related to API key management by applying custom capability restrictions or role hardening plugins. 2. Monitor WordPress user activities for suspicious API key deletion attempts, using audit logging plugins or SIEM integration. 3. Limit the number of users with Subscriber or higher privileges to only those necessary, enforcing the principle of least privilege. 4. Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5. Contact the plugin vendor (webtoffee) for updates or patches and apply them promptly once available. 6. Consider temporarily disabling or replacing the plugin if the risk is unacceptable and no patch is available. 7. Educate site administrators and users about the risk of privilege misuse and enforce strong authentication controls to prevent account compromise. 8. Review and harden WordPress security configurations to reduce the risk of unauthorized access to authenticated accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images
Description
The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' developed by webtoffee. The vulnerability exists in all versions up to and including 1.8.3. Specifically, the function atgai_delete_api_key() lacks proper capability checks, enabling any authenticated user with at least Subscriber-level privileges to invoke this function and delete the API key associated with the plugin. The API key is critical for the plugin's operation, as it likely facilitates communication with external AI services for generating alt text. By deleting this key, an attacker can disrupt the plugin's ability to auto-generate or bulk update alt texts, impacting website accessibility and SEO. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. There is no confidentiality or availability impact, but integrity is affected due to unauthorized modification of the API key. No known exploits have been reported, and no patches have been released at the time of publication. The vulnerability was reserved on 2025-10-23 and published on 2025-11-12. The plugin is used on WordPress sites, which are widespread globally, including Europe. The vulnerability could be exploited by malicious insiders or compromised accounts with Subscriber or higher privileges to degrade site functionality.
Potential Impact
For European organizations, the primary impact is operational disruption of the alt text generation functionality on WordPress sites using this plugin. This can affect website accessibility compliance, SEO rankings, and user experience, especially for organizations relying on automated alt text for large image repositories. While the vulnerability does not expose sensitive data or cause denial of service, the loss of the API key could require administrative intervention to restore plugin functionality, increasing operational overhead. Organizations with multiple users having Subscriber or higher roles are at increased risk, as any such user could exploit this flaw. This vulnerability could be leveraged in targeted attacks to degrade web presence or accessibility compliance, which is critical under EU regulations such as the Web Accessibility Directive. Although no direct data breach risk exists, the integrity loss and potential disruption could indirectly affect trust and compliance posture.
Mitigation Recommendations
1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking plugin functions related to API key management by applying custom capability restrictions or role hardening plugins. 2. Monitor WordPress user activities for suspicious API key deletion attempts, using audit logging plugins or SIEM integration. 3. Limit the number of users with Subscriber or higher privileges to only those necessary, enforcing the principle of least privilege. 4. Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5. Contact the plugin vendor (webtoffee) for updates or patches and apply them promptly once available. 6. Consider temporarily disabling or replacing the plugin if the risk is unacceptable and no patch is available. 7. Educate site administrators and users about the risk of privilege misuse and enforce strong authentication controls to prevent account compromise. 8. Review and harden WordPress security configurations to reduce the risk of unauthorized access to authenticated accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T15:16:28.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6914387341f318252713cf4d
Added to database: 11/12/2025, 7:34:11 AM
Last enriched: 11/12/2025, 7:49:34 AM
Last updated: 11/12/2025, 9:00:06 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-46595: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Algosec Algosec FireFlow
MediumCVE-2025-12903: CWE-639 Authorization Bypass Through User-Controlled Key in mrclayton Payment Plugins Braintree For WooCommerce
HighCVE-2025-12732: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
MediumICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider
MediumCVE-2025-13047: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ViewLead Technology Bacteriology Laboratory Reporting System
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.