Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12524: CWE-639 Authorization Bypass Through User-Controlled Key in johnjamesjacoby Post Type Switcher

0
Medium
VulnerabilityCVE-2025-12524cvecve-2025-12524cwe-639
Published: Tue Nov 18 2025 (11/18/2025, 06:43:09 UTC)
Source: CVE Database V5
Vendor/Project: johnjamesjacoby
Product: Post Type Switcher

Description

The Post Type Switcher plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.0.0 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to modify the post type of arbitrary posts and pages they do not own, including those created by administrators, which can lead to site disruption, broken navigation, and SEO impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:40:41 UTC

Technical Analysis

The Post Type Switcher plugin for WordPress, developed by johnjamesjacoby, suffers from an authorization bypass vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key). This vulnerability exists in all versions up to and including 4.0.0. The root cause is an Insecure Direct Object Reference (IDOR) due to insufficient validation of a user-supplied key parameter that controls which post type is assigned to a post. Authenticated users with Author-level privileges or higher can exploit this flaw to change the post type of arbitrary posts and pages, including those owned by administrators. This unauthorized modification can disrupt site structure by moving content between post types, potentially breaking navigation menus, altering content visibility, and harming SEO rankings. The vulnerability requires no user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 5.4 (medium severity), reflecting low complexity and no confidentiality impact but moderate integrity and availability impact. No patches or mitigations have been officially released as of the publication date (November 18, 2025), and no active exploits have been reported. The vulnerability highlights the importance of proper authorization checks on user-controlled inputs in WordPress plugins, especially those that modify content metadata.

Potential Impact

This vulnerability allows attackers with Author-level access to manipulate post types of content they do not own, including administrator-created posts. The impact includes potential site disruption through altered content organization, broken navigation menus, and degraded user experience. SEO can be negatively affected if important pages are changed to less visible post types or removed from indexing. While confidentiality is not compromised, the integrity and availability of website content are at risk. For organizations relying on WordPress for content management, this can lead to reputational damage, loss of traffic, and operational challenges in restoring correct content structure. Since the exploit requires authenticated access at Author level or above, the risk is higher in environments where user permissions are broadly assigned or compromised. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations should immediately audit and restrict Author-level and higher privileges to trusted users only, minimizing the number of accounts that can exploit this vulnerability. Implement strict role-based access controls and monitor for unusual post type changes in logs. Until an official patch is released, consider disabling or removing the Post Type Switcher plugin if it is not essential. If removal is not feasible, apply web application firewall (WAF) rules to detect and block suspicious requests attempting to modify post types via user-controlled keys. Regularly update WordPress and plugins to the latest versions once patches are available. Additionally, conduct security reviews of other plugins for similar authorization bypass issues. Employ monitoring tools to detect unexpected content structure changes and alert administrators promptly. Educate content authors and administrators about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T16:41:14.529Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c17f491aee3c10155a86c

Added to database: 11/18/2025, 6:53:40 AM

Last enriched: 2/27/2026, 8:40:41 PM

Last updated: 3/22/2026, 6:33:09 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses