CVE-2025-12961: CWE-862 Missing Authorization in arkadiykilesso Download Panel (Biggiko Team)
The Download Panel plugin for WordPress is vulnerable to unauthorized settings modification due to a missing capability check on the 'wp_ajax_save_settings' AJAX action in all versions up to, and including, 1.3.3. This is due to the absence of any capability verification in the `dlpn_save_settings()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to arbitrarily modify plugin settings including display text, download links, button colors, and other visual customizations.
AI Analysis
Technical Summary
CVE-2025-12961 identifies a missing authorization vulnerability (CWE-862) in the Download Panel WordPress plugin developed by Biggiko Team, affecting all versions up to and including 1.3.3. The root cause is the absence of capability checks in the `dlpn_save_settings()` function, which handles the 'wp_ajax_save_settings' AJAX action. This function is responsible for saving plugin settings such as display text, download links, button colors, and other UI customizations. Because the plugin does not verify whether the requesting user has sufficient privileges, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to modify plugin settings arbitrarily. This flaw does not allow unauthenticated attackers to exploit it, but it lowers the privilege barrier significantly, as Subscribers typically have minimal permissions. The vulnerability impacts the integrity of the plugin's configuration and potentially the user experience or trustworthiness of the affected website by enabling unauthorized visual or content changes. The CVSS v3.1 score is 4.3 (medium), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. Since the Download Panel plugin is used on WordPress sites, the threat surface includes any site that employs this plugin and allows Subscriber or higher roles to access the backend or AJAX endpoints. The lack of patch links suggests a fix is not yet released, so mitigation must rely on access control and monitoring until an update is available.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of WordPress sites using the Download Panel plugin. Attackers with low-level authenticated access can alter plugin settings, potentially defacing websites, injecting misleading download links, or modifying UI elements to misinform users or facilitate social engineering attacks. While confidentiality and availability are not directly impacted, the reputational damage and user trust erosion can be significant, especially for e-commerce, media, or governmental websites relying on accurate content presentation. The ease of exploitation by low-privilege users increases risk in environments where user role management is lax or where Subscriber accounts are widely distributed. This vulnerability could also be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or social engineering. European organizations with public-facing WordPress sites and multiple user roles should consider this a moderate risk that requires timely mitigation to prevent misuse.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites using the Download Panel plugin, ensuring that Subscriber-level accounts are limited and monitored. 2. Restrict access to AJAX endpoints by implementing additional server-side checks or web application firewall (WAF) rules that block unauthorized requests to 'wp_ajax_save_settings' from low-privilege users. 3. Temporarily disable or remove the Download Panel plugin if it is not critical to operations until a security patch is released. 4. Monitor logs for suspicious AJAX requests or unexpected changes to plugin settings indicative of exploitation attempts. 5. Educate site administrators to review plugin settings regularly and verify the integrity of download links and UI elements. 6. Once a patch or update is available from the vendor, apply it promptly to restore proper authorization checks. 7. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts being used to exploit this vulnerability. 8. Employ security plugins that can detect unauthorized changes to WordPress plugin settings or files.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12961: CWE-862 Missing Authorization in arkadiykilesso Download Panel (Biggiko Team)
Description
The Download Panel plugin for WordPress is vulnerable to unauthorized settings modification due to a missing capability check on the 'wp_ajax_save_settings' AJAX action in all versions up to, and including, 1.3.3. This is due to the absence of any capability verification in the `dlpn_save_settings()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to arbitrarily modify plugin settings including display text, download links, button colors, and other visual customizations.
AI-Powered Analysis
Technical Analysis
CVE-2025-12961 identifies a missing authorization vulnerability (CWE-862) in the Download Panel WordPress plugin developed by Biggiko Team, affecting all versions up to and including 1.3.3. The root cause is the absence of capability checks in the `dlpn_save_settings()` function, which handles the 'wp_ajax_save_settings' AJAX action. This function is responsible for saving plugin settings such as display text, download links, button colors, and other UI customizations. Because the plugin does not verify whether the requesting user has sufficient privileges, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to modify plugin settings arbitrarily. This flaw does not allow unauthenticated attackers to exploit it, but it lowers the privilege barrier significantly, as Subscribers typically have minimal permissions. The vulnerability impacts the integrity of the plugin's configuration and potentially the user experience or trustworthiness of the affected website by enabling unauthorized visual or content changes. The CVSS v3.1 score is 4.3 (medium), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. Since the Download Panel plugin is used on WordPress sites, the threat surface includes any site that employs this plugin and allows Subscriber or higher roles to access the backend or AJAX endpoints. The lack of patch links suggests a fix is not yet released, so mitigation must rely on access control and monitoring until an update is available.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of WordPress sites using the Download Panel plugin. Attackers with low-level authenticated access can alter plugin settings, potentially defacing websites, injecting misleading download links, or modifying UI elements to misinform users or facilitate social engineering attacks. While confidentiality and availability are not directly impacted, the reputational damage and user trust erosion can be significant, especially for e-commerce, media, or governmental websites relying on accurate content presentation. The ease of exploitation by low-privilege users increases risk in environments where user role management is lax or where Subscriber accounts are widely distributed. This vulnerability could also be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or social engineering. European organizations with public-facing WordPress sites and multiple user roles should consider this a moderate risk that requires timely mitigation to prevent misuse.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites using the Download Panel plugin, ensuring that Subscriber-level accounts are limited and monitored. 2. Restrict access to AJAX endpoints by implementing additional server-side checks or web application firewall (WAF) rules that block unauthorized requests to 'wp_ajax_save_settings' from low-privilege users. 3. Temporarily disable or remove the Download Panel plugin if it is not critical to operations until a security patch is released. 4. Monitor logs for suspicious AJAX requests or unexpected changes to plugin settings indicative of exploitation attempts. 5. Educate site administrators to review plugin settings regularly and verify the integrity of download links and UI elements. 6. Once a patch or update is available from the vendor, apply it promptly to restore proper authorization checks. 7. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts being used to exploit this vulnerability. 8. Employ security plugins that can detect unauthorized changes to WordPress plugin settings or files.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T16:50:04.836Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c305a35a0ab0a56271071
Added to database: 11/18/2025, 8:37:46 AM
Last enriched: 11/18/2025, 8:55:14 AM
Last updated: 11/21/2025, 11:10:23 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Salesforce Instances Hacked via Gainsight Integrations
MediumCVE-2025-13138: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
HighCVE-2025-12964: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nalam-1 Magical Products Display – Elementor WooCommerce Widgets | Product Sliders, Grids & AJAX Search
MediumCVE-2025-12750: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in trainingbusinesspros Groundhogg — CRM, Newsletters, and Marketing Automation
MediumCVE-2025-12160: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nmedia Simple User Registration
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.