Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12366: CWE-639 Authorization Bypass Through User-Controlled Key in softaculous Page Builder: Pagelayer – Drag and Drop website builder

0
Medium
VulnerabilityCVE-2025-12366cvecve-2025-12366cwe-639
Published: Thu Nov 13 2025 (11/13/2025, 03:27:37 UTC)
Source: CVE Database V5
Vendor/Project: softaculous
Product: Page Builder: Pagelayer – Drag and Drop website builder

Description

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.5 via the pagelayer_replace_page function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace media files belonging to other users, including administrators.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:24:26 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12366 affects the Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress, developed by Softaculous. This plugin is widely used to create and manage website content via a drag-and-drop interface. The flaw is classified as CWE-639: Authorization Bypass Through User-Controlled Key, specifically an Insecure Direct Object Reference (IDOR). The root cause lies in the pagelayer_replace_page function, which fails to properly validate a key parameter controlled by the user. This missing validation allows authenticated users with Author-level permissions or higher to replace media files owned by other users, including those owned by administrators. Such unauthorized replacement can lead to integrity issues, such as defacement, insertion of malicious content, or disruption of legitimate media assets. The vulnerability affects all versions up to and including 2.0.5. The attack vector is remote over the network (AV:N), requires low attack complexity (AC:L), and privileges at the level of Author or above (PR:L). No user interaction is required (UI:N), and the scope remains unchanged (S:U). The impact affects integrity (I:L) but not confidentiality or availability. Although no public exploits have been reported yet, the vulnerability poses a risk to websites relying on this plugin for content management. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate attention from administrators.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of media files on affected WordPress sites. Attackers with Author-level access can replace media assets belonging to other users, including administrators, potentially leading to website defacement, insertion of malicious images or files, and disruption of normal site operations. While confidentiality and availability are not directly impacted, the integrity compromise can damage organizational reputation, erode user trust, and facilitate further attacks if malicious content is introduced. For organizations relying heavily on WordPress and this plugin, especially those with multiple content contributors, the risk of insider threats or compromised Author accounts is significant. The vulnerability could be leveraged in targeted attacks against high-profile websites to manipulate content or deliver malware. Since exploitation requires authenticated access, the threat is somewhat limited to insiders or attackers who have already compromised lower-level accounts. However, the ease of exploitation and the potential to affect administrator-owned media elevate the risk profile. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Page Builder: Pagelayer plugin and verify the version in use. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict Author-level and higher permissions strictly to trusted users to minimize the risk of exploitation. 2) Implement monitoring and alerting on media file changes, especially those performed by Author-level users, to detect unauthorized replacements quickly. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the pagelayer_replace_page function or unusual media replacement activities. 4) Consider temporarily disabling or uninstalling the plugin if it is not critical to operations. 5) Harden WordPress security by enforcing strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. 6) Regularly back up media files and website content to enable rapid restoration in case of tampering. 7) Monitor vendor communications for patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on permission management, proactive monitoring, and compensating controls tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T18:41:31.071Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691553e024a15f0eafbbc09b

Added to database: 11/13/2025, 3:43:28 AM

Last enriched: 2/27/2026, 8:24:26 PM

Last updated: 3/22/2026, 11:40:23 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses