CVE-2025-13358: CWE-862 Missing Authorization in codeconfig CodeConfig Accessibility
The Accessiy By CodeConfig Accessibility plugin for WordPress is vulnerable to unauthorized page creation due to missing authorization checks in versions up to, and including, 1.0.0. This is due to the plugin not performing capability checks in the `Settings::createPage()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary published pages on the site via the `ccpcaCreatePage` AJAX action.
AI Analysis
Technical Summary
CVE-2025-13358 identifies a missing authorization vulnerability (CWE-862) in the CodeConfig Accessibility plugin for WordPress, specifically in the Settings::createPage() function. The plugin fails to perform capability checks before allowing the creation of new pages via the `ccpcaCreatePage` AJAX action. As a result, any authenticated user with at least Subscriber-level privileges can exploit this flaw to create arbitrary published pages on the affected WordPress site. This bypasses intended access controls and allows unauthorized content injection. The vulnerability affects all versions up to and including 1.0.0 of the plugin. Since WordPress roles such as Subscriber are typically assigned to minimally privileged users, this vulnerability significantly lowers the bar for exploitation. The attack vector is network-based and does not require additional user interaction beyond authentication. The vulnerability impacts the integrity of the website content but does not affect confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits are currently in the wild. The CVSS 3.1 base score is 5.3, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N reflecting network attack vector, low attack complexity, no privileges required beyond authentication, no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress-based websites that utilize the CodeConfig Accessibility plugin. Unauthorized page creation can be exploited to inject misleading or malicious content, potentially damaging brand reputation, misleading customers, or facilitating social engineering and phishing campaigns. Although the vulnerability does not directly compromise sensitive data or site availability, the ability to publish arbitrary content undermines trust in the affected websites. Organizations in sectors with high regulatory scrutiny around accessibility and content integrity, such as government, healthcare, and finance, may face compliance risks if unauthorized content is published. Additionally, attackers could leverage this vulnerability as a foothold for further attacks by embedding malicious scripts or links within created pages. The medium severity reflects the limited scope of impact but does not diminish the importance of timely remediation, especially for public-facing sites with broad user bases.
Mitigation Recommendations
To mitigate CVE-2025-13358, organizations should immediately assess whether the CodeConfig Accessibility plugin is installed and active on their WordPress sites. If so, they should upgrade to a patched version once available or apply manual code fixes to enforce proper capability checks in the `Settings::createPage()` function, ensuring only authorized roles (e.g., Administrator or Editor) can create pages. As an interim measure, restrict plugin usage to trusted users by limiting Subscriber-level accounts or disabling the plugin if not essential. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting the `ccpcaCreatePage` action. Regularly audit user roles and permissions to minimize the number of accounts with elevated privileges. Monitor website content for unauthorized page creation or unexpected changes. Additionally, educate site administrators about the risks of installing plugins without thorough security reviews and encourage timely updates. Employing security plugins that monitor for unauthorized content changes can also help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13358: CWE-862 Missing Authorization in codeconfig CodeConfig Accessibility
Description
The Accessiy By CodeConfig Accessibility plugin for WordPress is vulnerable to unauthorized page creation due to missing authorization checks in versions up to, and including, 1.0.0. This is due to the plugin not performing capability checks in the `Settings::createPage()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary published pages on the site via the `ccpcaCreatePage` AJAX action.
AI-Powered Analysis
Technical Analysis
CVE-2025-13358 identifies a missing authorization vulnerability (CWE-862) in the CodeConfig Accessibility plugin for WordPress, specifically in the Settings::createPage() function. The plugin fails to perform capability checks before allowing the creation of new pages via the `ccpcaCreatePage` AJAX action. As a result, any authenticated user with at least Subscriber-level privileges can exploit this flaw to create arbitrary published pages on the affected WordPress site. This bypasses intended access controls and allows unauthorized content injection. The vulnerability affects all versions up to and including 1.0.0 of the plugin. Since WordPress roles such as Subscriber are typically assigned to minimally privileged users, this vulnerability significantly lowers the bar for exploitation. The attack vector is network-based and does not require additional user interaction beyond authentication. The vulnerability impacts the integrity of the website content but does not affect confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits are currently in the wild. The CVSS 3.1 base score is 5.3, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N reflecting network attack vector, low attack complexity, no privileges required beyond authentication, no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress-based websites that utilize the CodeConfig Accessibility plugin. Unauthorized page creation can be exploited to inject misleading or malicious content, potentially damaging brand reputation, misleading customers, or facilitating social engineering and phishing campaigns. Although the vulnerability does not directly compromise sensitive data or site availability, the ability to publish arbitrary content undermines trust in the affected websites. Organizations in sectors with high regulatory scrutiny around accessibility and content integrity, such as government, healthcare, and finance, may face compliance risks if unauthorized content is published. Additionally, attackers could leverage this vulnerability as a foothold for further attacks by embedding malicious scripts or links within created pages. The medium severity reflects the limited scope of impact but does not diminish the importance of timely remediation, especially for public-facing sites with broad user bases.
Mitigation Recommendations
To mitigate CVE-2025-13358, organizations should immediately assess whether the CodeConfig Accessibility plugin is installed and active on their WordPress sites. If so, they should upgrade to a patched version once available or apply manual code fixes to enforce proper capability checks in the `Settings::createPage()` function, ensuring only authorized roles (e.g., Administrator or Editor) can create pages. As an interim measure, restrict plugin usage to trusted users by limiting Subscriber-level accounts or disabling the plugin if not essential. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting the `ccpcaCreatePage` action. Regularly audit user roles and permissions to minimize the number of accounts with elevated privileges. Monitor website content for unauthorized page creation or unexpected changes. Additionally, educate site administrators about the risks of installing plugins without thorough security reviews and encourage timely updates. Employing security plugins that monitor for unauthorized content changes can also help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T15:51:31.791Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c71e11163305efef3dc8
Added to database: 12/6/2025, 6:03:10 AM
Last enriched: 12/6/2025, 6:11:21 AM
Last updated: 12/10/2025, 5:36:50 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13607: CWE-306 Missing Authentication for Critical Function in D-Link DCS-F5614-L1
CriticalCVE-2025-52493: n/a
UnknownCVE-2025-67643: Vulnerability in Jenkins Project Jenkins Redpen - Pipeline Reporter for Jira Plugin
MediumCVE-2025-67642: Vulnerability in Jenkins Project Jenkins HashiCorp Vault Plugin
MediumCVE-2025-67641: Vulnerability in Jenkins Project Jenkins Coverage Plugin
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.