CVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given access to SiteSEO by an administrator and legacy storage is enabled. In affected WooCommerce installations, this exposes sensitive customer billing information including names, email addresses, phone numbers, physical addresses, and payment methods.
AI Analysis
Technical Summary
CVE-2025-13085 is an improper authorization vulnerability (CWE-285) found in the SiteSEO – SEO Simplified WordPress plugin developed by Softaculous, affecting all versions up to and including 1.3.2. The root cause is missing object-level authorization checks within the resolve_variables() AJAX handler. This flaw allows authenticated users possessing the siteseo_manage capability—typically users with Author-level privileges who have been granted SiteSEO access by an administrator—to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they do not have edit permissions for. The vulnerability is particularly critical in WooCommerce installations where legacy storage is enabled, as it exposes sensitive customer billing information such as names, email addresses, phone numbers, physical addresses, and payment methods. The attack vector requires network access to the WordPress site and valid authentication with the specific plugin capability but does not require further user interaction. The vulnerability impacts confidentiality by enabling unauthorized data disclosure but does not affect data integrity or availability. No public exploits have been reported yet, and no official patches are currently available, though updates are expected. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and required privileges for exploitation. This vulnerability highlights the importance of proper authorization checks in AJAX handlers and the risks posed by granting plugin capabilities to lower-privileged users.
Potential Impact
For European organizations using WordPress sites with the SiteSEO – SEO Simplified plugin, particularly those running WooCommerce stores, this vulnerability poses a significant risk to customer data confidentiality. Unauthorized disclosure of sensitive billing information can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial fraud. The exposure of personal identifiable information (PII) such as names, contact details, and payment methods can facilitate identity theft and targeted phishing attacks. Although the vulnerability does not allow data modification or service disruption, the breach of confidentiality alone can have severe legal and operational consequences under European data protection laws. Organizations with multiple authors or contributors granted SiteSEO access are at higher risk, as these users can exploit the flaw without needing elevated administrative privileges. The lack of public exploits reduces immediate risk but does not eliminate the threat, especially from insider threats or targeted attackers with valid credentials.
Mitigation Recommendations
European organizations should immediately audit and restrict the assignment of the siteseo_manage capability to only highly trusted users, preferably administrators. Disable legacy storage in WooCommerce if not required, as it increases exposure risk. Monitor and log usage of the resolve_variables() AJAX handler to detect unusual access patterns. Implement strict role-based access controls (RBAC) and review plugin permissions regularly. Until an official patch is released, consider temporarily disabling the SiteSEO plugin or removing SiteSEO access from non-administrative users. Employ Web Application Firewalls (WAFs) to monitor and potentially block suspicious AJAX requests targeting the vulnerable handler. Educate site administrators about the risk and encourage prompt application of updates once available. Additionally, conduct privacy impact assessments to evaluate exposure and notify affected customers if data leakage is suspected, in compliance with GDPR requirements.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
Description
The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given access to SiteSEO by an administrator and legacy storage is enabled. In affected WooCommerce installations, this exposes sensitive customer billing information including names, email addresses, phone numbers, physical addresses, and payment methods.
AI-Powered Analysis
Technical Analysis
CVE-2025-13085 is an improper authorization vulnerability (CWE-285) found in the SiteSEO – SEO Simplified WordPress plugin developed by Softaculous, affecting all versions up to and including 1.3.2. The root cause is missing object-level authorization checks within the resolve_variables() AJAX handler. This flaw allows authenticated users possessing the siteseo_manage capability—typically users with Author-level privileges who have been granted SiteSEO access by an administrator—to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they do not have edit permissions for. The vulnerability is particularly critical in WooCommerce installations where legacy storage is enabled, as it exposes sensitive customer billing information such as names, email addresses, phone numbers, physical addresses, and payment methods. The attack vector requires network access to the WordPress site and valid authentication with the specific plugin capability but does not require further user interaction. The vulnerability impacts confidentiality by enabling unauthorized data disclosure but does not affect data integrity or availability. No public exploits have been reported yet, and no official patches are currently available, though updates are expected. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and required privileges for exploitation. This vulnerability highlights the importance of proper authorization checks in AJAX handlers and the risks posed by granting plugin capabilities to lower-privileged users.
Potential Impact
For European organizations using WordPress sites with the SiteSEO – SEO Simplified plugin, particularly those running WooCommerce stores, this vulnerability poses a significant risk to customer data confidentiality. Unauthorized disclosure of sensitive billing information can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial fraud. The exposure of personal identifiable information (PII) such as names, contact details, and payment methods can facilitate identity theft and targeted phishing attacks. Although the vulnerability does not allow data modification or service disruption, the breach of confidentiality alone can have severe legal and operational consequences under European data protection laws. Organizations with multiple authors or contributors granted SiteSEO access are at higher risk, as these users can exploit the flaw without needing elevated administrative privileges. The lack of public exploits reduces immediate risk but does not eliminate the threat, especially from insider threats or targeted attackers with valid credentials.
Mitigation Recommendations
European organizations should immediately audit and restrict the assignment of the siteseo_manage capability to only highly trusted users, preferably administrators. Disable legacy storage in WooCommerce if not required, as it increases exposure risk. Monitor and log usage of the resolve_variables() AJAX handler to detect unusual access patterns. Implement strict role-based access controls (RBAC) and review plugin permissions regularly. Until an official patch is released, consider temporarily disabling the SiteSEO plugin or removing SiteSEO access from non-administrative users. Employ Web Application Firewalls (WAFs) to monitor and potentially block suspicious AJAX requests targeting the vulnerable handler. Educate site administrators about the risk and encourage prompt application of updates once available. Additionally, conduct privacy impact assessments to evaluate exposure and notify affected customers if data leakage is suspected, in compliance with GDPR requirements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T19:32:01.839Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d6a73a27e6d5e91bd839a
Added to database: 11/19/2025, 6:57:55 AM
Last enriched: 11/26/2025, 8:07:41 AM
Last updated: 1/7/2026, 7:15:33 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-31962: CWE-613 Insufficient Session Expiration in HCLSoftware BigFix IVR
LowCVE-2026-0656: CWE-862 Missing Authorization in ipaymu iPaymu Payment Gateway for WooCommerce
HighCVE-2025-14904: CWE-352 Cross-Site Request Forgery (CSRF) in anilankola Newsletter Email Subscribe
MediumCVE-2025-14901: CWE-862 Missing Authorization in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder
MediumCVE-2025-14888: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anjan011 Simple User Meta Editor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.