Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13741: CWE-862 Missing Authorization in publishpress Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories

0
Medium
VulnerabilityCVE-2025-13741cvecve-2025-13741cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 11:15:44 UTC)
Source: CVE Database V5
Vendor/Project: publishpress
Product: Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories

Description

The Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the getAuthors function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to retrieve emails for all users with edit_posts capability.

AI-Powered Analysis

AILast updated: 12/23/2025, 12:12:27 UTC

Technical Analysis

CVE-2025-13741 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories' in all versions up to and including 4.9.2. The root cause is the absence of a proper capability check in the getAuthors function, which is responsible for retrieving author-related data. This flaw allows any authenticated user with at least Contributor-level privileges to access email addresses of all users who have the edit_posts capability, which typically includes Editors and Administrators. The vulnerability is exploitable remotely without user interaction, as it requires only authenticated access to the WordPress backend. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited scope of impact (confidentiality only) and the requirement for authenticated access. No integrity or availability impacts are noted. No patches or known exploits have been reported at the time of publication, but the exposure of email addresses can facilitate targeted phishing or social engineering attacks. The vulnerability affects a widely used WordPress plugin, which is popular among content management teams for scheduling and managing post statuses and categories.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of email addresses of privileged users, which can lead to increased risk of spear-phishing, social engineering, and targeted attacks against key personnel such as editors and administrators. While the vulnerability does not allow direct modification or deletion of content, the exposure of sensitive user data undermines confidentiality and can be leveraged as a stepping stone for further attacks. Organizations relying on WordPress with the affected PublishPress plugin, especially those with Contributor-level users, are at risk. This can be particularly concerning for media companies, publishing houses, and other content-driven enterprises prevalent in Europe. The breach of user privacy may also have regulatory implications under GDPR, as email addresses are personal data. The lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.

Mitigation Recommendations

1. Immediately update the 'Schedule Post Changes With PublishPress Future' plugin to a patched version once available. 2. Until a patch is released, restrict Contributor-level and above access to trusted users only, minimizing the number of users who can exploit this flaw. 3. Implement strict role-based access controls (RBAC) and audit user permissions regularly to ensure minimal necessary privileges. 4. Monitor WordPress logs for unusual access patterns or attempts to enumerate user data. 5. Consider temporarily disabling the plugin if it is not critical to operations. 6. Educate users, especially those with elevated privileges, about phishing risks and encourage vigilance. 7. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. 8. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalation vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T13:44:15.219Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694144fdb7167ed5be7864d0

Added to database: 12/16/2025, 11:39:41 AM

Last enriched: 12/23/2025, 12:12:27 PM

Last updated: 2/7/2026, 1:07:55 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats