Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12898: CWE-862 Missing Authorization in lbell Pretty Google Calendar

0
Medium
VulnerabilityCVE-2025-12898cvecve-2025-12898cwe-862
Published: Sat Dec 20 2025 (12/20/2025, 03:20:22 UTC)
Source: CVE Database V5
Vendor/Project: lbell
Product: Pretty Google Calendar

Description

The Pretty Google Calendar plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the pgcal_ajax_handler() function in all versions up to, and including, 2.0.0. This makes it possible for unauthenticated attackers to retrieve the Google API key set in the plugin's settings.

AI-Powered Analysis

AILast updated: 12/20/2025, 03:53:41 UTC

Technical Analysis

The Pretty Google Calendar plugin for WordPress, developed by lbell, suffers from a missing authorization vulnerability identified as CVE-2025-12898 (CWE-862). The vulnerability exists in the pgcal_ajax_handler() function, which handles AJAX requests but lacks proper capability checks to verify if the requester is authorized. As a result, unauthenticated attackers can invoke this function remotely to retrieve the Google API key stored in the plugin's settings. This API key is sensitive as it can grant access to Google services linked to the calendar, potentially enabling attackers to gather calendar data or abuse the API quota. The vulnerability affects all versions up to and including 2.0.0. The CVSS v3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) with no integrity or availability impact. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-862, indicating missing authorization checks. This flaw is particularly concerning for WordPress sites that rely on the Pretty Google Calendar plugin to display Google Calendar data, as exposure of the API key can lead to unauthorized data access or quota abuse. Since the attack requires no authentication and can be performed remotely, it poses a significant risk to affected sites until mitigated.

Potential Impact

For European organizations, the exposure of Google API keys through this vulnerability can lead to unauthorized access to Google Calendar data, potentially leaking sensitive scheduling or organizational information. Attackers could also abuse the API key to perform actions that consume API quotas, leading to service disruptions or additional costs. While the vulnerability does not directly compromise the integrity or availability of the affected WordPress sites, the confidentiality breach can have downstream effects such as reputational damage, compliance violations (e.g., GDPR if personal data is exposed), and increased risk of targeted phishing or social engineering attacks using calendar information. Organizations relying on the Pretty Google Calendar plugin for internal or public-facing sites are at risk, especially if the API key is linked to sensitive Google services. The lack of authentication requirement and ease of exploitation increase the likelihood of automated scanning and exploitation attempts, raising the urgency for mitigation in European contexts where data protection regulations are stringent.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the vulnerable AJAX endpoint (pgcal_ajax_handler) by configuring web application firewalls (WAFs) or server-level access controls (e.g., .htaccess rules) to allow only trusted IP addresses or authenticated users. Organizations should audit their WordPress installations to identify usage of the Pretty Google Calendar plugin and assess exposure. If possible, temporarily disable the plugin until a patch is released. Additionally, rotate the exposed Google API keys to invalidate any potentially compromised credentials. Monitor web server logs for suspicious access patterns targeting the AJAX handler. Once a vendor patch is available, apply it promptly. Educate site administrators about the risks of exposing API keys and enforce the principle of least privilege in API key permissions to limit potential damage from key exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T19:05:37.066Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694619d2c376abdb7ecb86a1

Added to database: 12/20/2025, 3:36:50 AM

Last enriched: 12/20/2025, 3:53:41 AM

Last updated: 12/20/2025, 9:17:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats