Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12526: CWE-862 Missing Authorization in michielve Private Google Calendars

0
Medium
VulnerabilityCVE-2025-12526cvecve-2025-12526cwe-862
Published: Tue Nov 11 2025 (11/11/2025, 03:30:45 UTC)
Source: CVE Database V5
Vendor/Project: michielve
Product: Private Google Calendars

Description

The Private Google Calendars plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pgc_remove' action in all versions up to, and including, 20250811. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:41:08 UTC

Technical Analysis

CVE-2025-12526 is a vulnerability identified in the Private Google Calendars plugin for WordPress, developed by michielve. The issue stems from a missing capability check on the 'pgc_remove' action, which is responsible for resetting the plugin's settings. This missing authorization allows any authenticated user with Subscriber-level privileges or higher to invoke this action and modify plugin configurations without proper permissions. The vulnerability affects all plugin versions up to and including 20250811. The Common Weakness Enumeration (CWE) associated with this vulnerability is CWE-862, which refers to missing authorization. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). This means an attacker needs to be authenticated with at least Subscriber-level access but can exploit the vulnerability remotely without user interaction. The impact is limited to unauthorized modification of plugin settings, which could disrupt calendar functionality or cause misconfigurations. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on 2025-10-30 and published on 2025-11-11. No official patches or updates have been linked yet, so mitigation relies on access control and monitoring.

Potential Impact

The primary impact of CVE-2025-12526 is unauthorized modification of the Private Google Calendars plugin settings by authenticated users with minimal privileges (Subscriber-level or higher). This can lead to misconfiguration of calendar data, potential disruption of calendar synchronization, or denial of intended functionality. While the vulnerability does not directly compromise confidentiality or availability, the integrity of calendar data and plugin behavior is at risk. Attackers could exploit this to cause confusion, disrupt scheduling, or prepare for further attacks by altering plugin settings. Organizations relying on this plugin for critical scheduling or event management may face operational disruptions. Since the attack requires only low-level authenticated access, it increases the risk from insider threats or compromised low-privilege accounts. The lack of user interaction and network-based exploitability further broadens the attack surface. However, the absence of known exploits in the wild and the medium CVSS score indicate a moderate risk level at present.

Mitigation Recommendations

1. Immediately restrict Subscriber-level and other low-privilege user roles from accessing or triggering the 'pgc_remove' action by implementing custom capability checks or role restrictions via WordPress hooks or security plugins. 2. Monitor and audit user activities related to the Private Google Calendars plugin, especially any attempts to reset or modify plugin settings. 3. Apply any official patches or updates released by the plugin developer as soon as they become available. 4. Consider temporarily disabling the Private Google Calendars plugin if it is not critical to operations until a patch is released. 5. Use a Web Application Firewall (WAF) to detect and block unauthorized requests targeting the 'pgc_remove' action. 6. Educate users and administrators about the risk of privilege escalation and enforce strong authentication and account management policies to reduce the risk of compromised accounts. 7. Regularly review and minimize the number of users with Subscriber-level or higher access to reduce the attack surface. 8. Engage with the plugin vendor or community to encourage timely patch development and disclosure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T16:49:26.458Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b13114bc3e00ba783d67

Added to database: 11/11/2025, 3:44:49 AM

Last enriched: 2/27/2026, 8:41:08 PM

Last updated: 3/28/2026, 9:09:25 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses