Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified

0
Medium
VulnerabilityCVE-2025-13085cvecve-2025-13085cwe-285
Published: Wed Nov 19 2025 (11/19/2025, 06:45:25 UTC)
Source: CVE Database V5
Vendor/Project: softaculous
Product: SiteSEO – SEO Simplified

Description

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given access to SiteSEO by an administrator and legacy storage is enabled. In affected WooCommerce installations, this exposes sensitive customer billing information including names, email addresses, phone numbers, physical addresses, and payment methods.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:29:16 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13085 affects the SiteSEO – SEO Simplified plugin for WordPress, versions up to and including 1.3.2. The root cause is improper authorization (CWE-285) due to missing object-level authorization checks within the resolve_variables() AJAX handler. This handler is responsible for resolving custom field variables, but it fails to verify whether the authenticated user has permission to access the metadata of the targeted post, page, attachment, or WooCommerce order. Attackers with the siteseo_manage capability—typically users with Author-level roles granted SiteSEO access by an administrator—can exploit this flaw to read arbitrary post metadata they normally cannot edit. In WooCommerce installations, this vulnerability is particularly critical as it exposes sensitive customer billing information, including personally identifiable information (PII) and payment details, potentially violating privacy regulations. The vulnerability requires the attacker to be authenticated and have the siteseo_manage capability, but does not require user interaction beyond that. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and required privileges. No patches or exploits are currently publicly available, but the risk of sensitive data disclosure remains significant for affected sites, especially e-commerce platforms using WooCommerce with legacy storage enabled.

Potential Impact

The primary impact of CVE-2025-13085 is unauthorized disclosure of sensitive data. Attackers with limited privileges can access metadata from posts, pages, attachments, and WooCommerce orders they should not be able to view. For WooCommerce users, this includes sensitive customer billing information such as names, email addresses, phone numbers, physical addresses, and payment methods, which can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can facilitate identity theft, fraud, and targeted phishing attacks. Organizations worldwide using the affected plugin, especially those with multi-author WordPress sites or e-commerce stores, face increased risk of data leakage. The requirement for authenticated access limits exposure to some extent, but insider threats or compromised lower-privileged accounts can exploit this. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is widely known.

Mitigation Recommendations

To mitigate CVE-2025-13085, organizations should first verify if they use the SiteSEO – SEO Simplified plugin and determine the version. Since no official patch is currently available, administrators should restrict the siteseo_manage capability strictly to trusted users, ideally limiting it to administrators only. Review and audit user roles and permissions to ensure that Author-level or other lower-privileged users do not have unnecessary SiteSEO access. Disable legacy storage if it is enabled and not required, as this feature is linked to the vulnerability's exploitability. Monitor access logs for suspicious AJAX requests to the resolve_variables() handler. Consider temporarily disabling the plugin if sensitive WooCommerce data is at risk and no immediate patch is available. Stay updated with vendor announcements for forthcoming patches. Implement web application firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting this endpoint. Finally, conduct regular security audits and penetration tests focusing on authorization controls within WordPress plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T19:32:01.839Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6a73a27e6d5e91bd839a

Added to database: 11/19/2025, 6:57:55 AM

Last enriched: 2/27/2026, 9:29:16 AM

Last updated: 3/23/2026, 10:29:46 PM

Views: 225

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses