Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified

0
Medium
VulnerabilityCVE-2025-13085cvecve-2025-13085cwe-285
Published: Wed Nov 19 2025 (11/19/2025, 06:45:25 UTC)
Source: CVE Database V5
Vendor/Project: softaculous
Product: SiteSEO – SEO Simplified

Description

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given access to SiteSEO by an administrator and legacy storage is enabled. In affected WooCommerce installations, this exposes sensitive customer billing information including names, email addresses, phone numbers, physical addresses, and payment methods.

AI-Powered Analysis

AILast updated: 11/19/2025, 07:13:05 UTC

Technical Analysis

The vulnerability CVE-2025-13085 affects the SiteSEO – SEO Simplified plugin for WordPress, specifically versions up to and including 1.3.2. The root cause is improper authorization (CWE-285) in the resolve_variables() AJAX handler, which lacks object-level permission checks. This flaw allows any authenticated user with the siteseo_manage capability—commonly granted to Author-level users by administrators—to retrieve arbitrary post metadata from posts, pages, attachments, or WooCommerce orders they do not have edit rights to. The attack vector leverages the plugin's custom field variable resolution feature, which, when legacy storage is enabled, exposes sensitive data. In WooCommerce contexts, this can lead to leakage of customer billing details such as names, email addresses, phone numbers, physical addresses, and payment methods. The vulnerability does not require user interaction beyond authentication and does not affect data integrity or availability, only confidentiality. No patches or exploits are currently publicly available, but the risk remains for organizations with misconfigured permissions or legacy storage enabled. The CVSS 3.1 score of 4.3 reflects a network attack vector with low complexity and low privileges required, but limited impact scope.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to those operating WordPress sites with the SiteSEO – SEO Simplified plugin installed, especially if WooCommerce is used for e-commerce. The exposure of sensitive customer billing information could lead to privacy violations under GDPR, resulting in regulatory fines and reputational damage. Unauthorized disclosure of personal data such as names, emails, phone numbers, and payment details could facilitate identity theft, fraud, or targeted phishing attacks. Since the vulnerability requires authenticated access with specific plugin permissions, the impact is mitigated by proper user role management; however, organizations with lax access controls or delegated SiteSEO permissions to non-administrative users are at higher risk. The confidentiality breach could undermine customer trust and lead to financial and legal consequences. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. Nonetheless, the sensitive nature of exposed data makes this a significant concern for European businesses handling personal and payment information.

Mitigation Recommendations

European organizations should immediately audit user roles and permissions related to the SiteSEO plugin, ensuring that only trusted administrators have the siteseo_manage capability. Restrict SiteSEO access to the minimum necessary users, preferably administrators only. Disable legacy storage in the plugin settings if possible, as this feature enables the sensitive data exposure. Monitor WordPress user accounts for unauthorized privilege escalations or suspicious activity. Since no official patch is currently available, consider temporarily deactivating the SiteSEO plugin or replacing it with alternative SEO tools that do not have this vulnerability. Implement strict WooCommerce order metadata access controls and review custom field usage to limit sensitive data exposure. Regularly update WordPress core, plugins, and themes to incorporate security fixes once patches for this vulnerability are released. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting the resolve_variables() handler. Finally, educate administrators on the risks of granting plugin capabilities to lower-privileged users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T19:32:01.839Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6a73a27e6d5e91bd839a

Added to database: 11/19/2025, 6:57:55 AM

Last enriched: 11/19/2025, 7:13:05 AM

Last updated: 11/19/2025, 9:55:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats