Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images

0
Medium
VulnerabilityCVE-2025-12113cvecve-2025-12113cwe-862
Published: Wed Nov 12 2025 (11/12/2025, 07:27:41 UTC)
Source: CVE Database V5
Vendor/Project: webtoffee
Product: Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images

Description

The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.

AI-Powered Analysis

AILast updated: 11/12/2025, 07:49:34 UTC

Technical Analysis

CVE-2025-12113 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images' developed by webtoffee. The vulnerability exists in all versions up to and including 1.8.3. Specifically, the function atgai_delete_api_key() lacks proper capability checks, enabling any authenticated user with at least Subscriber-level privileges to invoke this function and delete the API key associated with the plugin. The API key is critical for the plugin's operation, as it likely facilitates communication with external AI services for generating alt text. By deleting this key, an attacker can disrupt the plugin's ability to auto-generate or bulk update alt texts, impacting website accessibility and SEO. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. There is no confidentiality or availability impact, but integrity is affected due to unauthorized modification of the API key. No known exploits have been reported, and no patches have been released at the time of publication. The vulnerability was reserved on 2025-10-23 and published on 2025-11-12. The plugin is used on WordPress sites, which are widespread globally, including Europe. The vulnerability could be exploited by malicious insiders or compromised accounts with Subscriber or higher privileges to degrade site functionality.

Potential Impact

For European organizations, the primary impact is operational disruption of the alt text generation functionality on WordPress sites using this plugin. This can affect website accessibility compliance, SEO rankings, and user experience, especially for organizations relying on automated alt text for large image repositories. While the vulnerability does not expose sensitive data or cause denial of service, the loss of the API key could require administrative intervention to restore plugin functionality, increasing operational overhead. Organizations with multiple users having Subscriber or higher roles are at increased risk, as any such user could exploit this flaw. This vulnerability could be leveraged in targeted attacks to degrade web presence or accessibility compliance, which is critical under EU regulations such as the Web Accessibility Directive. Although no direct data breach risk exists, the integrity loss and potential disruption could indirectly affect trust and compliance posture.

Mitigation Recommendations

1. Immediately restrict Subscriber and other low-privilege user roles from accessing or invoking plugin functions related to API key management by applying custom capability restrictions or role hardening plugins. 2. Monitor WordPress user activities for suspicious API key deletion attempts, using audit logging plugins or SIEM integration. 3. Limit the number of users with Subscriber or higher privileges to only those necessary, enforcing the principle of least privilege. 4. Regularly back up the API key and plugin configuration to enable quick restoration if deletion occurs. 5. Contact the plugin vendor (webtoffee) for updates or patches and apply them promptly once available. 6. Consider temporarily disabling or replacing the plugin if the risk is unacceptable and no patch is available. 7. Educate site administrators and users about the risk of privilege misuse and enforce strong authentication controls to prevent account compromise. 8. Review and harden WordPress security configurations to reduce the risk of unauthorized access to authenticated accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-23T15:16:28.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914387341f318252713cf4d

Added to database: 11/12/2025, 7:34:11 AM

Last enriched: 11/12/2025, 7:49:34 AM

Last updated: 11/12/2025, 9:00:06 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats