CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images
The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
AI Analysis
Technical Summary
CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' WordPress plugin developed by webtoffee. The vulnerability resides in the atgai_delete_api_key() function, which lacks proper capability checks to verify if the authenticated user has sufficient privileges to perform the API key deletion. As a result, any authenticated user with at least Subscriber-level access can invoke this function to delete the API key associated with the plugin. The API key is critical for the plugin's operation, enabling it to connect to external AI services for generating and bulk updating alt text for images. Deletion of this key disrupts the plugin’s functionality, potentially causing loss of automated alt text generation capabilities, which can impact website accessibility and SEO. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a partial impact on integrity. The vulnerability affects all plugin versions up to and including 1.8.3. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The flaw highlights the importance of implementing proper authorization checks in WordPress plugins, especially those handling sensitive API keys or configuration data.
Potential Impact
For European organizations, this vulnerability can lead to disruption of automated alt text generation on WordPress websites, which may degrade web accessibility compliance and SEO performance. While it does not expose sensitive data or cause service outages, the loss of API keys can interrupt workflows relying on AI-generated alt text, potentially increasing manual workload and reducing site quality. Organizations with multiple users having Subscriber-level or higher access are at greater risk, as any such user could exploit this flaw. This could be particularly impactful for e-commerce, media, and public sector websites that rely heavily on image accessibility. Additionally, the integrity of the website’s content management process is compromised, which could indirectly affect user trust and regulatory compliance related to accessibility standards such as the EU Web Accessibility Directive. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as automated scanning tools may detect vulnerable installations.
Mitigation Recommendations
Until an official patch is released, European organizations should implement the following mitigations: 1) Restrict WordPress user roles to the minimum necessary, avoiding granting Subscriber-level or higher access to untrusted users. 2) Monitor and audit user activities related to plugin settings and API key management to detect unauthorized attempts to delete API keys. 3) Employ WordPress security plugins or custom code to add additional authorization checks around the atgai_delete_api_key() function, if feasible. 4) Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5) Disable or remove the plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization controls. 6) Stay informed about updates from the vendor and apply patches promptly once available. 7) Consider implementing web application firewalls (WAFs) with rules to detect and block suspicious API key deletion requests. These steps go beyond generic advice by focusing on user role management, monitoring, and temporary compensating controls specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images
Description
The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' WordPress plugin developed by webtoffee. The vulnerability resides in the atgai_delete_api_key() function, which lacks proper capability checks to verify if the authenticated user has sufficient privileges to perform the API key deletion. As a result, any authenticated user with at least Subscriber-level access can invoke this function to delete the API key associated with the plugin. The API key is critical for the plugin's operation, enabling it to connect to external AI services for generating and bulk updating alt text for images. Deletion of this key disrupts the plugin’s functionality, potentially causing loss of automated alt text generation capabilities, which can impact website accessibility and SEO. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a partial impact on integrity. The vulnerability affects all plugin versions up to and including 1.8.3. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The flaw highlights the importance of implementing proper authorization checks in WordPress plugins, especially those handling sensitive API keys or configuration data.
Potential Impact
For European organizations, this vulnerability can lead to disruption of automated alt text generation on WordPress websites, which may degrade web accessibility compliance and SEO performance. While it does not expose sensitive data or cause service outages, the loss of API keys can interrupt workflows relying on AI-generated alt text, potentially increasing manual workload and reducing site quality. Organizations with multiple users having Subscriber-level or higher access are at greater risk, as any such user could exploit this flaw. This could be particularly impactful for e-commerce, media, and public sector websites that rely heavily on image accessibility. Additionally, the integrity of the website’s content management process is compromised, which could indirectly affect user trust and regulatory compliance related to accessibility standards such as the EU Web Accessibility Directive. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as automated scanning tools may detect vulnerable installations.
Mitigation Recommendations
Until an official patch is released, European organizations should implement the following mitigations: 1) Restrict WordPress user roles to the minimum necessary, avoiding granting Subscriber-level or higher access to untrusted users. 2) Monitor and audit user activities related to plugin settings and API key management to detect unauthorized attempts to delete API keys. 3) Employ WordPress security plugins or custom code to add additional authorization checks around the atgai_delete_api_key() function, if feasible. 4) Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5) Disable or remove the plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization controls. 6) Stay informed about updates from the vendor and apply patches promptly once available. 7) Consider implementing web application firewalls (WAFs) with rules to detect and block suspicious API key deletion requests. These steps go beyond generic advice by focusing on user role management, monitoring, and temporary compensating controls specific to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T15:16:28.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6914387341f318252713cf4d
Added to database: 11/12/2025, 7:34:11 AM
Last enriched: 11/19/2025, 8:06:53 AM
Last updated: 2/7/2026, 7:07:30 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.