CVE-2025-12165: CWE-862 Missing Authorization in huyme Webcake – Landing Page Builder
The Webcake – Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webcake_save_config' AJAX endpoint in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12165 affects the Webcake – Landing Page Builder plugin for WordPress, specifically versions up to 1.1. The root cause is a missing authorization check (CWE-862) on the 'webcake_save_config' AJAX endpoint, which is responsible for saving the plugin's configuration settings. This endpoint fails to verify whether the authenticated user has sufficient privileges before allowing configuration changes. As a result, any authenticated user with at least Subscriber-level access can exploit this flaw to modify plugin settings. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly lowers the barrier for exploitation compared to requiring Administrator access. The attack vector is network-based (remote), with no user interaction needed beyond authentication. The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability directly. No patches or fixes are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 base score is 4.3, indicating medium severity due to the limited impact and the requirement for authenticated access. The vulnerability was published on December 5, 2025, with the CWE classification of CWE-862 (Missing Authorization).
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of their WordPress-based marketing and landing page infrastructure. Unauthorized modification of plugin settings could lead to altered landing page content, potentially enabling phishing, misinformation, or the injection of malicious scripts that could affect end users or damage brand reputation. While the vulnerability does not allow direct data theft or denial of service, the ability to change plugin behavior without proper authorization can facilitate further attacks or undermine trust in web properties. Organizations relying on Webcake for customer engagement or lead generation may experience operational disruptions or reputational harm if attackers exploit this flaw. Given the widespread use of WordPress in Europe, especially among SMEs and digital marketing agencies, the potential impact is significant in sectors where landing page integrity is critical. The requirement for authenticated access limits exposure but does not eliminate risk, as Subscriber accounts are commonly created or compromised in many environments.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Webcake – Landing Page Builder plugin, particularly versions up to 1.1. Since no official patch is currently available, temporary mitigations include restricting Subscriber-level user creation and access, implementing strict user role management, and monitoring for unusual configuration changes in the plugin. Web application firewalls (WAFs) can be configured to block unauthorized AJAX requests to the 'webcake_save_config' endpoint from low-privilege users. Additionally, organizations should enforce multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. Regularly reviewing user accounts and permissions, combined with logging and alerting on configuration changes, will help detect exploitation attempts. Once a patch is released, prompt application of updates is critical. Security teams should also educate site administrators about the risks of granting unnecessary permissions to users and encourage the use of least privilege principles.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12165: CWE-862 Missing Authorization in huyme Webcake – Landing Page Builder
Description
The Webcake – Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webcake_save_config' AJAX endpoint in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12165 affects the Webcake – Landing Page Builder plugin for WordPress, specifically versions up to 1.1. The root cause is a missing authorization check (CWE-862) on the 'webcake_save_config' AJAX endpoint, which is responsible for saving the plugin's configuration settings. This endpoint fails to verify whether the authenticated user has sufficient privileges before allowing configuration changes. As a result, any authenticated user with at least Subscriber-level access can exploit this flaw to modify plugin settings. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly lowers the barrier for exploitation compared to requiring Administrator access. The attack vector is network-based (remote), with no user interaction needed beyond authentication. The vulnerability impacts the integrity of the plugin’s configuration but does not affect confidentiality or availability directly. No patches or fixes are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 base score is 4.3, indicating medium severity due to the limited impact and the requirement for authenticated access. The vulnerability was published on December 5, 2025, with the CWE classification of CWE-862 (Missing Authorization).
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of their WordPress-based marketing and landing page infrastructure. Unauthorized modification of plugin settings could lead to altered landing page content, potentially enabling phishing, misinformation, or the injection of malicious scripts that could affect end users or damage brand reputation. While the vulnerability does not allow direct data theft or denial of service, the ability to change plugin behavior without proper authorization can facilitate further attacks or undermine trust in web properties. Organizations relying on Webcake for customer engagement or lead generation may experience operational disruptions or reputational harm if attackers exploit this flaw. Given the widespread use of WordPress in Europe, especially among SMEs and digital marketing agencies, the potential impact is significant in sectors where landing page integrity is critical. The requirement for authenticated access limits exposure but does not eliminate risk, as Subscriber accounts are commonly created or compromised in many environments.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Webcake – Landing Page Builder plugin, particularly versions up to 1.1. Since no official patch is currently available, temporary mitigations include restricting Subscriber-level user creation and access, implementing strict user role management, and monitoring for unusual configuration changes in the plugin. Web application firewalls (WAFs) can be configured to block unauthorized AJAX requests to the 'webcake_save_config' endpoint from low-privilege users. Additionally, organizations should enforce multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. Regularly reviewing user accounts and permissions, combined with logging and alerting on configuration changes, will help detect exploitation attempts. Once a patch is released, prompt application of updates is critical. Security teams should also educate site administrators about the risks of granting unnecessary permissions to users and encourage the use of least privilege principles.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T14:16:57.300Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c77991e
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/12/2025, 6:04:42 AM
Last updated: 2/4/2026, 5:12:15 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowCVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.