CVE-2025-13741: CWE-862 Missing Authorization in publishpress Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
The Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the getAuthors function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to retrieve emails for all users with edit_posts capability.
AI Analysis
Technical Summary
CVE-2025-13741 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories' in all versions up to and including 4.9.2. The root cause is the absence of a proper capability check in the getAuthors function, which is responsible for retrieving author-related data. This flaw allows any authenticated user with at least Contributor-level privileges to access email addresses of all users who have the edit_posts capability, which typically includes Editors and Administrators. The vulnerability is exploitable remotely without user interaction, as it requires only authenticated access to the WordPress backend. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited scope of impact (confidentiality only) and the requirement for authenticated access. No integrity or availability impacts are noted. No patches or known exploits have been reported at the time of publication, but the exposure of email addresses can facilitate targeted phishing or social engineering attacks. The vulnerability affects a widely used WordPress plugin, which is popular among content management teams for scheduling and managing post statuses and categories.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of email addresses of privileged users, which can lead to increased risk of spear-phishing, social engineering, and targeted attacks against key personnel such as editors and administrators. While the vulnerability does not allow direct modification or deletion of content, the exposure of sensitive user data undermines confidentiality and can be leveraged as a stepping stone for further attacks. Organizations relying on WordPress with the affected PublishPress plugin, especially those with Contributor-level users, are at risk. This can be particularly concerning for media companies, publishing houses, and other content-driven enterprises prevalent in Europe. The breach of user privacy may also have regulatory implications under GDPR, as email addresses are personal data. The lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
1. Immediately update the 'Schedule Post Changes With PublishPress Future' plugin to a patched version once available. 2. Until a patch is released, restrict Contributor-level and above access to trusted users only, minimizing the number of users who can exploit this flaw. 3. Implement strict role-based access controls (RBAC) and audit user permissions regularly to ensure minimal necessary privileges. 4. Monitor WordPress logs for unusual access patterns or attempts to enumerate user data. 5. Consider temporarily disabling the plugin if it is not critical to operations. 6. Educate users, especially those with elevated privileges, about phishing risks and encourage vigilance. 7. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. 8. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalation vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13741: CWE-862 Missing Authorization in publishpress Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
Description
The Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the getAuthors function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to retrieve emails for all users with edit_posts capability.
AI-Powered Analysis
Technical Analysis
CVE-2025-13741 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories' in all versions up to and including 4.9.2. The root cause is the absence of a proper capability check in the getAuthors function, which is responsible for retrieving author-related data. This flaw allows any authenticated user with at least Contributor-level privileges to access email addresses of all users who have the edit_posts capability, which typically includes Editors and Administrators. The vulnerability is exploitable remotely without user interaction, as it requires only authenticated access to the WordPress backend. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited scope of impact (confidentiality only) and the requirement for authenticated access. No integrity or availability impacts are noted. No patches or known exploits have been reported at the time of publication, but the exposure of email addresses can facilitate targeted phishing or social engineering attacks. The vulnerability affects a widely used WordPress plugin, which is popular among content management teams for scheduling and managing post statuses and categories.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of email addresses of privileged users, which can lead to increased risk of spear-phishing, social engineering, and targeted attacks against key personnel such as editors and administrators. While the vulnerability does not allow direct modification or deletion of content, the exposure of sensitive user data undermines confidentiality and can be leveraged as a stepping stone for further attacks. Organizations relying on WordPress with the affected PublishPress plugin, especially those with Contributor-level users, are at risk. This can be particularly concerning for media companies, publishing houses, and other content-driven enterprises prevalent in Europe. The breach of user privacy may also have regulatory implications under GDPR, as email addresses are personal data. The lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
1. Immediately update the 'Schedule Post Changes With PublishPress Future' plugin to a patched version once available. 2. Until a patch is released, restrict Contributor-level and above access to trusted users only, minimizing the number of users who can exploit this flaw. 3. Implement strict role-based access controls (RBAC) and audit user permissions regularly to ensure minimal necessary privileges. 4. Monitor WordPress logs for unusual access patterns or attempts to enumerate user data. 5. Consider temporarily disabling the plugin if it is not critical to operations. 6. Educate users, especially those with elevated privileges, about phishing risks and encourage vigilance. 7. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. 8. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalation vectors.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-26T13:44:15.219Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694144fdb7167ed5be7864d0
Added to database: 12/16/2025, 11:39:41 AM
Last enriched: 12/23/2025, 12:12:27 PM
Last updated: 2/7/2026, 1:07:55 PM
Views: 129
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.