CVE-2025-12366: CWE-639 Authorization Bypass Through User-Controlled Key in softaculous Page Builder: Pagelayer – Drag and Drop website builder
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.5 via the pagelayer_replace_page function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace media files belonging to other users, including administrators.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12366 affects the Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress, developed by Softaculous. This plugin is widely used to create and manage website content via a drag-and-drop interface. The flaw is classified as CWE-639: Authorization Bypass Through User-Controlled Key, specifically an Insecure Direct Object Reference (IDOR). The root cause lies in the pagelayer_replace_page function, which fails to properly validate a key parameter controlled by the user. This missing validation allows authenticated users with Author-level permissions or higher to replace media files owned by other users, including those owned by administrators. Such unauthorized replacement can lead to integrity issues, such as defacement, insertion of malicious content, or disruption of legitimate media assets. The vulnerability affects all versions up to and including 2.0.5. The attack vector is remote over the network (AV:N), requires low attack complexity (AC:L), and privileges at the level of Author or above (PR:L). No user interaction is required (UI:N), and the scope remains unchanged (S:U). The impact affects integrity (I:L) but not confidentiality or availability. Although no public exploits have been reported yet, the vulnerability poses a risk to websites relying on this plugin for content management. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate attention from administrators.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of media files on affected WordPress sites. Attackers with Author-level access can replace media assets belonging to other users, including administrators, potentially leading to website defacement, insertion of malicious images or files, and disruption of normal site operations. While confidentiality and availability are not directly impacted, the integrity compromise can damage organizational reputation, erode user trust, and facilitate further attacks if malicious content is introduced. For organizations relying heavily on WordPress and this plugin, especially those with multiple content contributors, the risk of insider threats or compromised Author accounts is significant. The vulnerability could be leveraged in targeted attacks against high-profile websites to manipulate content or deliver malware. Since exploitation requires authenticated access, the threat is somewhat limited to insiders or attackers who have already compromised lower-level accounts. However, the ease of exploitation and the potential to affect administrator-owned media elevate the risk profile. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Page Builder: Pagelayer plugin and verify the version in use. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict Author-level and higher permissions strictly to trusted users to minimize the risk of exploitation. 2) Implement monitoring and alerting on media file changes, especially those performed by Author-level users, to detect unauthorized replacements quickly. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the pagelayer_replace_page function or unusual media replacement activities. 4) Consider temporarily disabling or uninstalling the plugin if it is not critical to operations. 5) Harden WordPress security by enforcing strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. 6) Regularly back up media files and website content to enable rapid restoration in case of tampering. 7) Monitor vendor communications for patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on permission management, proactive monitoring, and compensating controls tailored to this specific vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Japan, Netherlands
CVE-2025-12366: CWE-639 Authorization Bypass Through User-Controlled Key in softaculous Page Builder: Pagelayer – Drag and Drop website builder
Description
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.5 via the pagelayer_replace_page function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace media files belonging to other users, including administrators.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-12366 affects the Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress, developed by Softaculous. This plugin is widely used to create and manage website content via a drag-and-drop interface. The flaw is classified as CWE-639: Authorization Bypass Through User-Controlled Key, specifically an Insecure Direct Object Reference (IDOR). The root cause lies in the pagelayer_replace_page function, which fails to properly validate a key parameter controlled by the user. This missing validation allows authenticated users with Author-level permissions or higher to replace media files owned by other users, including those owned by administrators. Such unauthorized replacement can lead to integrity issues, such as defacement, insertion of malicious content, or disruption of legitimate media assets. The vulnerability affects all versions up to and including 2.0.5. The attack vector is remote over the network (AV:N), requires low attack complexity (AC:L), and privileges at the level of Author or above (PR:L). No user interaction is required (UI:N), and the scope remains unchanged (S:U). The impact affects integrity (I:L) but not confidentiality or availability. Although no public exploits have been reported yet, the vulnerability poses a risk to websites relying on this plugin for content management. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate attention from administrators.
Potential Impact
The primary impact of this vulnerability is the unauthorized modification of media files on affected WordPress sites. Attackers with Author-level access can replace media assets belonging to other users, including administrators, potentially leading to website defacement, insertion of malicious images or files, and disruption of normal site operations. While confidentiality and availability are not directly impacted, the integrity compromise can damage organizational reputation, erode user trust, and facilitate further attacks if malicious content is introduced. For organizations relying heavily on WordPress and this plugin, especially those with multiple content contributors, the risk of insider threats or compromised Author accounts is significant. The vulnerability could be leveraged in targeted attacks against high-profile websites to manipulate content or deliver malware. Since exploitation requires authenticated access, the threat is somewhat limited to insiders or attackers who have already compromised lower-level accounts. However, the ease of exploitation and the potential to affect administrator-owned media elevate the risk profile. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Page Builder: Pagelayer plugin and verify the version in use. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict Author-level and higher permissions strictly to trusted users to minimize the risk of exploitation. 2) Implement monitoring and alerting on media file changes, especially those performed by Author-level users, to detect unauthorized replacements quickly. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the pagelayer_replace_page function or unusual media replacement activities. 4) Consider temporarily disabling or uninstalling the plugin if it is not critical to operations. 5) Harden WordPress security by enforcing strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. 6) Regularly back up media files and website content to enable rapid restoration in case of tampering. 7) Monitor vendor communications for patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on permission management, proactive monitoring, and compensating controls tailored to this specific vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T18:41:31.071Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691553e024a15f0eafbbc09b
Added to database: 11/13/2025, 3:43:28 AM
Last enriched: 2/27/2026, 8:24:26 PM
Last updated: 3/22/2026, 11:40:23 AM
Views: 133
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.