CVE-2025-12168: CWE-862 Missing Authorization in memsource Phrase TMS Integration for WordPress
The Phrase TMS Integration for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_delete_log' AJAX endpoint in all versions up to, and including, 4.7.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete log files.
AI Analysis
Technical Summary
The Phrase TMS Integration for WordPress plugin, widely used for integrating translation management services into WordPress sites, contains a vulnerability identified as CVE-2025-12168. This vulnerability stems from a missing authorization check (CWE-862) on the AJAX endpoint 'wp_ajax_delete_log', which handles requests to delete log files. The flaw allows any authenticated user with at least Subscriber-level privileges to invoke this endpoint and delete logs without proper permission validation. Since WordPress Subscriber roles are typically assigned to users with minimal privileges, this vulnerability significantly lowers the barrier for unauthorized actions within affected sites. The vulnerability affects all plugin versions up to and including 4.7.5. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and only low privileges, but does not impact confidentiality or availability. The primary impact is on integrity, as logs can be deleted, potentially erasing evidence of malicious activity or operational issues. No user interaction is required beyond authentication, and no known exploits have been reported in the wild. The vulnerability was published in January 2026, with no official patch links available at this time. The missing authorization check represents a common security oversight where capability checks are not enforced on AJAX endpoints, exposing administrative or sensitive functions to unauthorized users. This vulnerability is particularly concerning for organizations relying on logs for compliance, security monitoring, or troubleshooting.
Potential Impact
For European organizations, the unauthorized deletion of log files can have significant operational and compliance consequences. Logs are critical for detecting security incidents, performing forensic investigations, and meeting regulatory requirements such as GDPR, which mandates accountability and traceability of data processing activities. The ability for low-privileged users to delete logs undermines these controls, increasing the risk that malicious activities go undetected or untraceable. Organizations in sectors with stringent compliance demands, such as finance, healthcare, and government, are especially vulnerable to the impact of compromised log integrity. Additionally, organizations using the Phrase TMS Integration plugin for managing multilingual content or translation workflows may face disruptions or loss of audit trails, affecting business continuity and trustworthiness of content management processes. While the vulnerability does not allow data exfiltration or system takeover, the loss of logs can indirectly facilitate further attacks by obscuring attacker actions. The medium severity rating reflects these considerations, emphasizing the need for timely mitigation to preserve security monitoring capabilities.
Mitigation Recommendations
1. Immediately restrict access to the Phrase TMS Integration plugin's administrative and AJAX endpoints to trusted roles only, ensuring that Subscriber-level users cannot invoke sensitive functions. 2. Implement custom capability checks or filters on the 'wp_ajax_delete_log' endpoint to enforce proper authorization until an official patch is released. 3. Monitor and audit user activities related to log management and deletion, setting up alerts for suspicious behavior. 4. Regularly back up log files to secure, immutable storage to prevent loss from unauthorized deletions. 5. Review and harden WordPress user role assignments, minimizing the number of users with elevated privileges. 6. Stay informed about updates from the plugin vendor and apply patches promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block unauthorized AJAX requests targeting this endpoint. 8. Conduct security awareness training for administrators and users about the risks of privilege misuse and the importance of log integrity. 9. Evaluate the necessity of the plugin in your environment; if not critical, consider disabling or removing it until patched. 10. Integrate log integrity verification tools to detect tampering or deletion attempts in real time.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-12168: CWE-862 Missing Authorization in memsource Phrase TMS Integration for WordPress
Description
The Phrase TMS Integration for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_delete_log' AJAX endpoint in all versions up to, and including, 4.7.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete log files.
AI-Powered Analysis
Technical Analysis
The Phrase TMS Integration for WordPress plugin, widely used for integrating translation management services into WordPress sites, contains a vulnerability identified as CVE-2025-12168. This vulnerability stems from a missing authorization check (CWE-862) on the AJAX endpoint 'wp_ajax_delete_log', which handles requests to delete log files. The flaw allows any authenticated user with at least Subscriber-level privileges to invoke this endpoint and delete logs without proper permission validation. Since WordPress Subscriber roles are typically assigned to users with minimal privileges, this vulnerability significantly lowers the barrier for unauthorized actions within affected sites. The vulnerability affects all plugin versions up to and including 4.7.5. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and only low privileges, but does not impact confidentiality or availability. The primary impact is on integrity, as logs can be deleted, potentially erasing evidence of malicious activity or operational issues. No user interaction is required beyond authentication, and no known exploits have been reported in the wild. The vulnerability was published in January 2026, with no official patch links available at this time. The missing authorization check represents a common security oversight where capability checks are not enforced on AJAX endpoints, exposing administrative or sensitive functions to unauthorized users. This vulnerability is particularly concerning for organizations relying on logs for compliance, security monitoring, or troubleshooting.
Potential Impact
For European organizations, the unauthorized deletion of log files can have significant operational and compliance consequences. Logs are critical for detecting security incidents, performing forensic investigations, and meeting regulatory requirements such as GDPR, which mandates accountability and traceability of data processing activities. The ability for low-privileged users to delete logs undermines these controls, increasing the risk that malicious activities go undetected or untraceable. Organizations in sectors with stringent compliance demands, such as finance, healthcare, and government, are especially vulnerable to the impact of compromised log integrity. Additionally, organizations using the Phrase TMS Integration plugin for managing multilingual content or translation workflows may face disruptions or loss of audit trails, affecting business continuity and trustworthiness of content management processes. While the vulnerability does not allow data exfiltration or system takeover, the loss of logs can indirectly facilitate further attacks by obscuring attacker actions. The medium severity rating reflects these considerations, emphasizing the need for timely mitigation to preserve security monitoring capabilities.
Mitigation Recommendations
1. Immediately restrict access to the Phrase TMS Integration plugin's administrative and AJAX endpoints to trusted roles only, ensuring that Subscriber-level users cannot invoke sensitive functions. 2. Implement custom capability checks or filters on the 'wp_ajax_delete_log' endpoint to enforce proper authorization until an official patch is released. 3. Monitor and audit user activities related to log management and deletion, setting up alerts for suspicious behavior. 4. Regularly back up log files to secure, immutable storage to prevent loss from unauthorized deletions. 5. Review and harden WordPress user role assignments, minimizing the number of users with elevated privileges. 6. Stay informed about updates from the plugin vendor and apply patches promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block unauthorized AJAX requests targeting this endpoint. 8. Conduct security awareness training for administrators and users about the risks of privilege misuse and the importance of log integrity. 9. Evaluate the necessity of the plugin in your environment; if not critical, consider disabling or removing it until patched. 10. Integrate log integrity verification tools to detect tampering or deletion attempts in real time.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T14:24:58.628Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696b1558b22c7ad86881e272
Added to database: 1/17/2026, 4:51:36 AM
Last enriched: 1/24/2026, 7:50:59 PM
Last updated: 2/7/2026, 5:12:54 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.