CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
CVE-2025-12360 is a medium-severity vulnerability in the WordPress plugin 'Better Find and Replace – AI-Powered Suggestions' by codesolz. The flaw arises from a missing capability check in the rtafar_ajax() function, allowing authenticated users with Subscriber-level access to misuse the OpenAI API key. Exploitation leads to unauthorized API calls that consume the plugin owner's OpenAI quota, potentially incurring unexpected costs. The vulnerability does not impact confidentiality or availability but affects integrity by enabling unauthorized resource usage. No user interaction is required beyond having a low-level authenticated account. There are no known exploits in the wild, and no patches have been published yet. European organizations using this plugin on WordPress sites should be aware of the risk of quota abuse and associated financial impact. Mitigation involves restricting API access through custom capability checks or disabling the plugin until an official fix is available. Countries with high WordPress adoption and active use of AI-powered plugins, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12360 affects the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. This plugin integrates AI-powered features by leveraging the OpenAI API to provide enhanced find-and-replace functionality. The root cause of the vulnerability is an improper authorization (CWE-285) due to the absence of a capability check in the rtafar_ajax() function, which handles AJAX requests related to the plugin's AI features. As a result, any authenticated user, including those with the minimal Subscriber role, can invoke this function to trigger OpenAI API calls using the plugin owner's API key. This unauthorized usage leads to consumption of the API quota, which may result in unexpected financial charges for the site owner. The vulnerability does not expose sensitive data or allow modification of site content but compromises the integrity of resource usage. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and limited impact confined to integrity. No patches or official fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability affects all versions up to and including 1.7.7 of the plugin. Given the widespread use of WordPress and increasing adoption of AI-powered plugins, this vulnerability presents a risk primarily related to financial abuse rather than data breach or service disruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is financial due to unauthorized consumption of the OpenAI API quota linked to the plugin owner's account. Organizations running WordPress sites with this plugin installed may face unexpected charges if attackers with low-level access exploit the flaw. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of resource usage and could lead to operational disruptions if API quotas are exhausted, potentially disabling AI-powered features. Additionally, the presence of this vulnerability may indicate insufficient access control practices, which could be leveraged in conjunction with other vulnerabilities. Organizations in sectors with strict compliance requirements may face reputational damage if unauthorized usage is detected. The risk is heightened for multi-user WordPress environments where many users have Subscriber-level access, such as community portals or membership sites common in Europe.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify if they are using the affected plugin versions (up to 1.7.7). Until an official patch is released, administrators should consider disabling the plugin to prevent unauthorized API usage. If disabling is not feasible, implement custom capability checks by modifying the plugin code to restrict access to the rtafar_ajax() function only to trusted roles (e.g., Administrator or Editor). Monitoring API usage logs from OpenAI can help detect abnormal consumption patterns indicative of exploitation. Additionally, restrict Subscriber-level user permissions to the minimum necessary and audit user accounts regularly to reduce the risk of abuse. Employ web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the vulnerable function. Finally, stay updated with vendor announcements for patches and apply them promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
Description
CVE-2025-12360 is a medium-severity vulnerability in the WordPress plugin 'Better Find and Replace – AI-Powered Suggestions' by codesolz. The flaw arises from a missing capability check in the rtafar_ajax() function, allowing authenticated users with Subscriber-level access to misuse the OpenAI API key. Exploitation leads to unauthorized API calls that consume the plugin owner's OpenAI quota, potentially incurring unexpected costs. The vulnerability does not impact confidentiality or availability but affects integrity by enabling unauthorized resource usage. No user interaction is required beyond having a low-level authenticated account. There are no known exploits in the wild, and no patches have been published yet. European organizations using this plugin on WordPress sites should be aware of the risk of quota abuse and associated financial impact. Mitigation involves restricting API access through custom capability checks or disabling the plugin until an official fix is available. Countries with high WordPress adoption and active use of AI-powered plugins, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12360 affects the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. This plugin integrates AI-powered features by leveraging the OpenAI API to provide enhanced find-and-replace functionality. The root cause of the vulnerability is an improper authorization (CWE-285) due to the absence of a capability check in the rtafar_ajax() function, which handles AJAX requests related to the plugin's AI features. As a result, any authenticated user, including those with the minimal Subscriber role, can invoke this function to trigger OpenAI API calls using the plugin owner's API key. This unauthorized usage leads to consumption of the API quota, which may result in unexpected financial charges for the site owner. The vulnerability does not expose sensitive data or allow modification of site content but compromises the integrity of resource usage. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and limited impact confined to integrity. No patches or official fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability affects all versions up to and including 1.7.7 of the plugin. Given the widespread use of WordPress and increasing adoption of AI-powered plugins, this vulnerability presents a risk primarily related to financial abuse rather than data breach or service disruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is financial due to unauthorized consumption of the OpenAI API quota linked to the plugin owner's account. Organizations running WordPress sites with this plugin installed may face unexpected charges if attackers with low-level access exploit the flaw. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of resource usage and could lead to operational disruptions if API quotas are exhausted, potentially disabling AI-powered features. Additionally, the presence of this vulnerability may indicate insufficient access control practices, which could be leveraged in conjunction with other vulnerabilities. Organizations in sectors with strict compliance requirements may face reputational damage if unauthorized usage is detected. The risk is heightened for multi-user WordPress environments where many users have Subscriber-level access, such as community portals or membership sites common in Europe.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify if they are using the affected plugin versions (up to 1.7.7). Until an official patch is released, administrators should consider disabling the plugin to prevent unauthorized API usage. If disabling is not feasible, implement custom capability checks by modifying the plugin code to restrict access to the rtafar_ajax() function only to trusted roles (e.g., Administrator or Editor). Monitoring API usage logs from OpenAI can help detect abnormal consumption patterns indicative of exploitation. Additionally, restrict Subscriber-level user permissions to the minimum necessary and audit user accounts regularly to reduce the risk of abuse. Employ web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the vulnerable function. Finally, stay updated with vendor announcements for patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T16:20:33.609Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690c517b03d96811746f9a52
Added to database: 11/6/2025, 7:42:51 AM
Last enriched: 11/6/2025, 7:53:23 AM
Last updated: 11/6/2025, 9:16:28 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.