Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12892: CWE-862 Missing Authorization in ays-pro Survey Maker

0
Medium
VulnerabilityCVE-2025-12892cvecve-2025-12892cwe-862
Published: Thu Nov 13 2025 (11/13/2025, 03:27:38 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Survey Maker

Description

The Survey Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_plugin_option() function in all versions up to, and including, 5.1.9.4. This makes it possible for unauthenticated attackers to update the ays_survey_maker_upgrade_plugin option.

AI-Powered Analysis

AILast updated: 11/20/2025, 04:49:14 UTC

Technical Analysis

CVE-2025-12892 is a vulnerability identified in the ays-pro Survey Maker plugin for WordPress, affecting all versions up to and including 5.1.9.4. The root cause is a missing authorization check (CWE-862) in the deactivate_plugin_option() function, which is responsible for modifying plugin options. This flaw allows unauthenticated attackers to update the ays_survey_maker_upgrade_plugin option without any capability verification, effectively enabling unauthorized modification of plugin configuration data. The vulnerability is exploitable remotely over the network without requiring any user interaction or authentication, increasing its attack surface. The impact is limited to integrity as attackers can alter plugin options, potentially leading to altered plugin behavior or enabling further attacks if combined with other vulnerabilities. However, the vulnerability does not directly compromise confidentiality or availability. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation and limited impact scope. No known public exploits or patches are available at the time of disclosure, which increases the risk window for organizations using this plugin. The plugin is commonly used in WordPress environments, which are widely deployed across many sectors, including business, education, and government websites.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the ays-pro Survey Maker plugin. Unauthorized modification of plugin options could lead to altered survey behavior, potential data manipulation, or the introduction of malicious configurations that might facilitate further exploitation or data collection abuse. Public-facing websites are particularly vulnerable since the exploit requires no authentication. While the direct impact on confidentiality and availability is low, the integrity compromise could undermine trust in survey data and potentially affect decision-making processes relying on such data. Organizations in sectors like education, market research, and public administration that use surveys extensively may face reputational damage or operational disruption. The lack of patches increases exposure time, and attackers could chain this vulnerability with others to escalate privileges or execute further attacks.

Mitigation Recommendations

1. Monitor official channels of the ays-pro Survey Maker plugin for security updates and apply patches promptly once available. 2. Restrict access to WordPress administrative endpoints using IP whitelisting or VPNs to limit exposure to unauthenticated requests. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke deactivate_plugin_option() or modify plugin options. 4. Regularly audit WordPress plugin configurations and logs for unauthorized changes or suspicious activity. 5. Consider disabling or replacing the Survey Maker plugin if immediate patching is not feasible, especially on high-risk or public-facing sites. 6. Implement least privilege principles for WordPress user roles to minimize potential damage from compromised plugins. 7. Educate site administrators about this vulnerability and encourage vigilance against unusual plugin behavior or site anomalies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T18:09:46.759Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691553e024a15f0eafbbc0aa

Added to database: 11/13/2025, 3:43:28 AM

Last enriched: 11/20/2025, 4:49:14 AM

Last updated: 12/28/2025, 12:06:09 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats