Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12367: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified

0
Medium
VulnerabilityCVE-2025-12367cvecve-2025-12367cwe-285
Published: Sat Nov 01 2025 (11/01/2025, 03:34:36 UTC)
Source: CVE Database V5
Vendor/Project: softaculous
Product: SiteSEO – SEO Simplified

Description

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.3.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Author-level access and above, to enable or disable arbitrary SiteSEO features that they should not have access to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:24:39 UTC

Technical Analysis

CVE-2025-12367 identifies an improper authorization vulnerability (CWE-285) in the SiteSEO – SEO Simplified plugin for WordPress, developed by softaculous. This vulnerability exists in all versions up to and including 1.3.1. The root cause is the plugin's failure to properly verify that a user has the necessary permissions before allowing them to enable or disable various SiteSEO features. Specifically, authenticated users with Author-level privileges or higher can exploit this flaw to modify plugin settings that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and privileges required are limited to authenticated users with Author or higher roles (PR:L). The scope of impact is limited to the plugin's configuration integrity (I:L), with no impact on confidentiality or availability. Although no public exploits have been reported, the vulnerability could be leveraged by malicious insiders or compromised accounts to alter SEO settings, potentially affecting website behavior or SEO outcomes. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The vulnerability was reserved on 2025-10-27 and published on 2025-11-01. No patches or updates have been linked yet, so mitigation may require manual intervention or monitoring until an official fix is released.

Potential Impact

The primary impact of CVE-2025-12367 is on the integrity of the SiteSEO plugin's configuration. Attackers with Author-level access can enable or disable SEO features arbitrarily, which could lead to unintended SEO behavior, misconfiguration, or manipulation of website metadata and indexing directives. This may indirectly affect website visibility, search engine rankings, and traffic. While the vulnerability does not directly compromise confidentiality or availability, the ability to alter SEO settings could be exploited to degrade the website's reputation or performance. Organizations relying heavily on SEO for business operations, marketing, or e-commerce may experience reduced effectiveness of their SEO strategies. Additionally, if attackers use this vulnerability as part of a broader attack chain, it could facilitate further compromise or persistence. The scope is limited to authenticated users with elevated privileges, reducing the risk of widespread exploitation but still posing a significant threat within compromised or insider contexts.

Mitigation Recommendations

1. Immediately restrict Author-level and higher user privileges to trusted personnel only, minimizing the risk of exploitation by unauthorized users. 2. Monitor user activity logs for unusual changes to SiteSEO plugin settings, especially toggling of features by Author-level users. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block unauthorized requests attempting to modify plugin configurations. 4. Until an official patch is released, consider disabling or uninstalling the SiteSEO plugin if it is not critical to operations. 5. If the plugin is essential, apply custom code or hooks to enforce proper authorization checks on feature toggling actions. 6. Keep WordPress core and all plugins updated, and subscribe to vendor advisories for prompt patch deployment once available. 7. Conduct regular security audits of user roles and permissions to ensure least privilege principles are enforced. 8. Educate site administrators about the risks associated with elevated privileges and the importance of secure credential management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T19:24:21.361Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905841371a6fc4aff3da4af

Added to database: 11/1/2025, 3:52:51 AM

Last enriched: 2/27/2026, 8:24:39 PM

Last updated: 3/23/2026, 2:38:35 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses