Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12391: CWE-862 Missing Authorization in seventhqueen Restrictions for BuddyPress

0
Medium
VulnerabilityCVE-2025-12391cvecve-2025-12391cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 09:27:40 UTC)
Source: CVE Database V5
Vendor/Project: seventhqueen
Product: Restrictions for BuddyPress

Description

The Restrictions for BuddyPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_optin_optout() function in all versions up to, and including, 1.5.2. This makes it possible for unauthenticated attackers to opt in and out of tracking.

AI-Powered Analysis

AILast updated: 11/18/2025, 09:54:07 UTC

Technical Analysis

CVE-2025-12391 identifies a missing authorization vulnerability (CWE-862) in the Restrictions for BuddyPress plugin developed by seventhqueen for WordPress. The vulnerability exists in the handle_optin_optout() function, which manages user opt-in and opt-out preferences for tracking. Due to the absence of proper capability checks, unauthenticated attackers can invoke this function remotely to alter tracking preferences without any authentication or user interaction. This flaw affects all versions up to and including 1.5.2 of the plugin. The vulnerability does not expose confidential data nor does it affect system availability but compromises the integrity of tracking settings, potentially allowing attackers to manipulate user consent states. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and no user interaction. No public exploits have been reported yet, but the vulnerability could be leveraged to undermine privacy controls or skew analytics data. The plugin is widely used in WordPress environments that integrate BuddyPress social networking features, making it relevant for websites relying on user tracking and consent management.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized modification of user tracking preferences, potentially violating GDPR and other privacy regulations that mandate explicit user consent for tracking. Manipulated opt-in/out states could result in non-compliance fines or reputational damage if users’ privacy choices are overridden. Additionally, inaccurate tracking data may affect business analytics and decision-making. While the vulnerability does not directly expose sensitive data or disrupt service availability, the integrity compromise of consent mechanisms is significant in privacy-sensitive environments. Organizations relying on Restrictions for BuddyPress to manage user consent on their WordPress sites should consider the risk of unauthorized changes that could impact compliance and trust. The lack of authentication requirement and ease of exploitation increase the urgency for mitigation.

Mitigation Recommendations

Since no official patch links are currently available, organizations should monitor the vendor’s announcements for updates addressing this vulnerability. In the interim, administrators can implement custom authorization checks by modifying the plugin code to verify user capabilities before allowing opt-in/out changes. Restricting access to the affected function via web application firewall (WAF) rules or IP whitelisting can reduce exposure. Regularly audit plugin activity logs to detect unusual opt-in/out modifications. Consider disabling the Restrictions for BuddyPress plugin if it is not essential or replacing it with alternative plugins that enforce proper authorization. Ensure WordPress core and all plugins are kept up to date. Finally, review privacy policies and user consent mechanisms to confirm compliance despite potential manipulation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T13:19:06.686Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c3e32a312a743bb510b86

Added to database: 11/18/2025, 9:36:50 AM

Last enriched: 11/18/2025, 9:54:07 AM

Last updated: 11/21/2025, 1:50:54 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats