Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images

0
Medium
VulnerabilityCVE-2025-12113cvecve-2025-12113cwe-862
Published: Wed Nov 12 2025 (11/12/2025, 07:27:41 UTC)
Source: CVE Database V5
Vendor/Project: webtoffee
Product: Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images

Description

The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.

AI-Powered Analysis

AILast updated: 11/19/2025, 08:06:53 UTC

Technical Analysis

CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' WordPress plugin developed by webtoffee. The vulnerability resides in the atgai_delete_api_key() function, which lacks proper capability checks to verify if the authenticated user has sufficient privileges to perform the API key deletion. As a result, any authenticated user with at least Subscriber-level access can invoke this function to delete the API key associated with the plugin. The API key is critical for the plugin's operation, enabling it to connect to external AI services for generating and bulk updating alt text for images. Deletion of this key disrupts the plugin’s functionality, potentially causing loss of automated alt text generation capabilities, which can impact website accessibility and SEO. The vulnerability is remotely exploitable over the network without user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low impact on confidentiality and availability but a partial impact on integrity. The vulnerability affects all plugin versions up to and including 1.8.3. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The flaw highlights the importance of implementing proper authorization checks in WordPress plugins, especially those handling sensitive API keys or configuration data.

Potential Impact

For European organizations, this vulnerability can lead to disruption of automated alt text generation on WordPress websites, which may degrade web accessibility compliance and SEO performance. While it does not expose sensitive data or cause service outages, the loss of API keys can interrupt workflows relying on AI-generated alt text, potentially increasing manual workload and reducing site quality. Organizations with multiple users having Subscriber-level or higher access are at greater risk, as any such user could exploit this flaw. This could be particularly impactful for e-commerce, media, and public sector websites that rely heavily on image accessibility. Additionally, the integrity of the website’s content management process is compromised, which could indirectly affect user trust and regulatory compliance related to accessibility standards such as the EU Web Accessibility Directive. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as automated scanning tools may detect vulnerable installations.

Mitigation Recommendations

Until an official patch is released, European organizations should implement the following mitigations: 1) Restrict WordPress user roles to the minimum necessary, avoiding granting Subscriber-level or higher access to untrusted users. 2) Monitor and audit user activities related to plugin settings and API key management to detect unauthorized attempts to delete API keys. 3) Employ WordPress security plugins or custom code to add additional authorization checks around the atgai_delete_api_key() function, if feasible. 4) Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5) Disable or remove the plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization controls. 6) Stay informed about updates from the vendor and apply patches promptly once available. 7) Consider implementing web application firewalls (WAFs) with rules to detect and block suspicious API key deletion requests. These steps go beyond generic advice by focusing on user role management, monitoring, and temporary compensating controls specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-23T15:16:28.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914387341f318252713cf4d

Added to database: 11/12/2025, 7:34:11 AM

Last enriched: 11/19/2025, 8:06:53 AM

Last updated: 2/7/2026, 2:22:39 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats