Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions

0
Medium
VulnerabilityCVE-2025-12360cvecve-2025-12360cwe-285
Published: Thu Nov 06 2025 (11/06/2025, 07:27:05 UTC)
Source: CVE Database V5
Vendor/Project: codesolz
Product: Better Find and Replace – AI-Powered Suggestions

Description

CVE-2025-12360 is a medium-severity vulnerability in the WordPress plugin 'Better Find and Replace – AI-Powered Suggestions' by codesolz. The flaw arises from a missing capability check in the rtafar_ajax() function, allowing authenticated users with Subscriber-level access to misuse the OpenAI API key. Exploitation leads to unauthorized API calls that consume the plugin owner's OpenAI quota, potentially incurring unexpected costs. The vulnerability does not impact confidentiality or availability but affects integrity by enabling unauthorized resource usage. No user interaction is required beyond having a low-level authenticated account. There are no known exploits in the wild, and no patches have been published yet. European organizations using this plugin on WordPress sites should be aware of the risk of quota abuse and associated financial impact. Mitigation involves restricting API access through custom capability checks or disabling the plugin until an official fix is available. Countries with high WordPress adoption and active use of AI-powered plugins, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 11/06/2025, 07:53:23 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12360 affects the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. This plugin integrates AI-powered features by leveraging the OpenAI API to provide enhanced find-and-replace functionality. The root cause of the vulnerability is an improper authorization (CWE-285) due to the absence of a capability check in the rtafar_ajax() function, which handles AJAX requests related to the plugin's AI features. As a result, any authenticated user, including those with the minimal Subscriber role, can invoke this function to trigger OpenAI API calls using the plugin owner's API key. This unauthorized usage leads to consumption of the API quota, which may result in unexpected financial charges for the site owner. The vulnerability does not expose sensitive data or allow modification of site content but compromises the integrity of resource usage. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and limited impact confined to integrity. No patches or official fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability affects all versions up to and including 1.7.7 of the plugin. Given the widespread use of WordPress and increasing adoption of AI-powered plugins, this vulnerability presents a risk primarily related to financial abuse rather than data breach or service disruption.

Potential Impact

For European organizations, the primary impact of this vulnerability is financial due to unauthorized consumption of the OpenAI API quota linked to the plugin owner's account. Organizations running WordPress sites with this plugin installed may face unexpected charges if attackers with low-level access exploit the flaw. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of resource usage and could lead to operational disruptions if API quotas are exhausted, potentially disabling AI-powered features. Additionally, the presence of this vulnerability may indicate insufficient access control practices, which could be leveraged in conjunction with other vulnerabilities. Organizations in sectors with strict compliance requirements may face reputational damage if unauthorized usage is detected. The risk is heightened for multi-user WordPress environments where many users have Subscriber-level access, such as community portals or membership sites common in Europe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first identify if they are using the affected plugin versions (up to 1.7.7). Until an official patch is released, administrators should consider disabling the plugin to prevent unauthorized API usage. If disabling is not feasible, implement custom capability checks by modifying the plugin code to restrict access to the rtafar_ajax() function only to trusted roles (e.g., Administrator or Editor). Monitoring API usage logs from OpenAI can help detect abnormal consumption patterns indicative of exploitation. Additionally, restrict Subscriber-level user permissions to the minimum necessary and audit user accounts regularly to reduce the risk of abuse. Employ web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the vulnerable function. Finally, stay updated with vendor announcements for patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T16:20:33.609Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c517b03d96811746f9a52

Added to database: 11/6/2025, 7:42:51 AM

Last enriched: 11/6/2025, 7:53:23 AM

Last updated: 11/6/2025, 9:16:28 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats