Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12961: CWE-862 Missing Authorization in arkadiykilesso Download Panel (Biggiko Team)

0
Medium
VulnerabilityCVE-2025-12961cvecve-2025-12961cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 08:27:37 UTC)
Source: CVE Database V5
Vendor/Project: arkadiykilesso
Product: Download Panel (Biggiko Team)

Description

The Download Panel plugin for WordPress is vulnerable to unauthorized settings modification due to a missing capability check on the 'wp_ajax_save_settings' AJAX action in all versions up to, and including, 1.3.3. This is due to the absence of any capability verification in the `dlpn_save_settings()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to arbitrarily modify plugin settings including display text, download links, button colors, and other visual customizations.

AI-Powered Analysis

AILast updated: 11/18/2025, 08:55:14 UTC

Technical Analysis

CVE-2025-12961 identifies a missing authorization vulnerability (CWE-862) in the Download Panel WordPress plugin developed by Biggiko Team, affecting all versions up to and including 1.3.3. The root cause is the absence of capability checks in the `dlpn_save_settings()` function, which handles the 'wp_ajax_save_settings' AJAX action. This function is responsible for saving plugin settings such as display text, download links, button colors, and other UI customizations. Because the plugin does not verify whether the requesting user has sufficient privileges, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to modify plugin settings arbitrarily. This flaw does not allow unauthenticated attackers to exploit it, but it lowers the privilege barrier significantly, as Subscribers typically have minimal permissions. The vulnerability impacts the integrity of the plugin's configuration and potentially the user experience or trustworthiness of the affected website by enabling unauthorized visual or content changes. The CVSS v3.1 score is 4.3 (medium), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. Since the Download Panel plugin is used on WordPress sites, the threat surface includes any site that employs this plugin and allows Subscriber or higher roles to access the backend or AJAX endpoints. The lack of patch links suggests a fix is not yet released, so mitigation must rely on access control and monitoring until an update is available.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of WordPress sites using the Download Panel plugin. Attackers with low-level authenticated access can alter plugin settings, potentially defacing websites, injecting misleading download links, or modifying UI elements to misinform users or facilitate social engineering attacks. While confidentiality and availability are not directly impacted, the reputational damage and user trust erosion can be significant, especially for e-commerce, media, or governmental websites relying on accurate content presentation. The ease of exploitation by low-privilege users increases risk in environments where user role management is lax or where Subscriber accounts are widely distributed. This vulnerability could also be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or social engineering. European organizations with public-facing WordPress sites and multiple user roles should consider this a moderate risk that requires timely mitigation to prevent misuse.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using the Download Panel plugin, ensuring that Subscriber-level accounts are limited and monitored. 2. Restrict access to AJAX endpoints by implementing additional server-side checks or web application firewall (WAF) rules that block unauthorized requests to 'wp_ajax_save_settings' from low-privilege users. 3. Temporarily disable or remove the Download Panel plugin if it is not critical to operations until a security patch is released. 4. Monitor logs for suspicious AJAX requests or unexpected changes to plugin settings indicative of exploitation attempts. 5. Educate site administrators to review plugin settings regularly and verify the integrity of download links and UI elements. 6. Once a patch or update is available from the vendor, apply it promptly to restore proper authorization checks. 7. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts being used to exploit this vulnerability. 8. Employ security plugins that can detect unauthorized changes to WordPress plugin settings or files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T16:50:04.836Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c305a35a0ab0a56271071

Added to database: 11/18/2025, 8:37:46 AM

Last enriched: 11/18/2025, 8:55:14 AM

Last updated: 11/21/2025, 11:10:23 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats