CVE-2025-12822: CWE-862 Missing Authorization in cyberlord92 WP Login and Register using JWT
The WP Login and Register using JWT plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mo_jwt_generate_new_api_key' function in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate a new API key on site's that do not have an API key configured and subsequently use that to access restricted endpoints.
AI Analysis
Technical Summary
CVE-2025-12822 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WP Login and Register using JWT plugin for WordPress, developed by cyberlord92. The flaw exists in all versions up to and including 3.0.0, where the function 'mo_jwt_generate_new_api_key' lacks proper capability checks. This omission allows any authenticated user with at least Subscriber-level access to generate a new API key on sites that do not already have an API key configured. The generated API key can then be used to access restricted endpoints that normally require higher privileges, effectively bypassing intended access controls. The vulnerability is remotely exploitable without user interaction and requires only low privileges, making it easier for attackers to leverage. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact, as the vulnerability does not affect integrity or availability. No patches or known exploits are currently available, but the risk remains significant for sites using this plugin without proper configuration or additional access restrictions.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized data exposure on WordPress sites using the affected plugin. Attackers with minimal privileges can escalate access by generating API keys, potentially accessing sensitive or restricted information. This can lead to data leaks, privacy violations, and compliance issues under regulations such as GDPR. Although the vulnerability does not directly impact system integrity or availability, unauthorized access to restricted endpoints can undermine trust and lead to reputational damage. Organizations relying on WordPress for customer-facing or internal portals are particularly vulnerable. The ease of exploitation and the widespread use of WordPress in Europe increase the likelihood of targeted attacks, especially in sectors with sensitive data such as finance, healthcare, and government services.
Mitigation Recommendations
1. Immediately review and restrict Subscriber-level user accounts to only trusted individuals, minimizing the attack surface. 2. Disable or remove the WP Login and Register using JWT plugin if it is not essential, or replace it with a more secure alternative. 3. If the plugin must be used, implement strict monitoring and logging of API key generation events to detect unauthorized activity. 4. Apply custom capability checks or patches to enforce authorization on the 'mo_jwt_generate_new_api_key' function until an official patch is released. 5. Restrict access to the WordPress admin dashboard and API endpoints via IP whitelisting or VPNs where feasible. 6. Conduct regular audits of API keys and revoke any suspicious or unused keys promptly. 7. Educate site administrators about the risks of low-privilege accounts and enforce strong role-based access controls. 8. Stay updated with vendor announcements for patches and apply them as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12822: CWE-862 Missing Authorization in cyberlord92 WP Login and Register using JWT
Description
The WP Login and Register using JWT plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mo_jwt_generate_new_api_key' function in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate a new API key on site's that do not have an API key configured and subsequently use that to access restricted endpoints.
AI-Powered Analysis
Technical Analysis
CVE-2025-12822 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WP Login and Register using JWT plugin for WordPress, developed by cyberlord92. The flaw exists in all versions up to and including 3.0.0, where the function 'mo_jwt_generate_new_api_key' lacks proper capability checks. This omission allows any authenticated user with at least Subscriber-level access to generate a new API key on sites that do not already have an API key configured. The generated API key can then be used to access restricted endpoints that normally require higher privileges, effectively bypassing intended access controls. The vulnerability is remotely exploitable without user interaction and requires only low privileges, making it easier for attackers to leverage. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact, as the vulnerability does not affect integrity or availability. No patches or known exploits are currently available, but the risk remains significant for sites using this plugin without proper configuration or additional access restrictions.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized data exposure on WordPress sites using the affected plugin. Attackers with minimal privileges can escalate access by generating API keys, potentially accessing sensitive or restricted information. This can lead to data leaks, privacy violations, and compliance issues under regulations such as GDPR. Although the vulnerability does not directly impact system integrity or availability, unauthorized access to restricted endpoints can undermine trust and lead to reputational damage. Organizations relying on WordPress for customer-facing or internal portals are particularly vulnerable. The ease of exploitation and the widespread use of WordPress in Europe increase the likelihood of targeted attacks, especially in sectors with sensitive data such as finance, healthcare, and government services.
Mitigation Recommendations
1. Immediately review and restrict Subscriber-level user accounts to only trusted individuals, minimizing the attack surface. 2. Disable or remove the WP Login and Register using JWT plugin if it is not essential, or replace it with a more secure alternative. 3. If the plugin must be used, implement strict monitoring and logging of API key generation events to detect unauthorized activity. 4. Apply custom capability checks or patches to enforce authorization on the 'mo_jwt_generate_new_api_key' function until an official patch is released. 5. Restrict access to the WordPress admin dashboard and API endpoints via IP whitelisting or VPNs where feasible. 6. Conduct regular audits of API keys and revoke any suspicious or unused keys promptly. 7. Educate site administrators about the risks of low-privilege accounts and enforce strong role-based access controls. 8. Stay updated with vendor announcements for patches and apply them as soon as they become available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T18:44:15.837Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d6897a27e6d5e91bc16dd
Added to database: 11/19/2025, 6:49:59 AM
Last enriched: 11/26/2025, 8:08:42 AM
Last updated: 1/7/2026, 5:06:21 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.