CVE-2025-13842: CWE-639 Authorization Bypass Through User-Controlled Key in mtekk Breadcrumb NavXT
The Breadcrumb NavXT plugin for WordPress is vulnerable to authorization bypass through user-controlled key in versions up to and including 7.5.0. This is due to the Gutenberg block renderer trusting the $_REQUEST['post_id'] parameter without verification in the includes/blocks/build/breadcrumb-trail/render.php file. This makes it possible for unauthenticated attackers to enumerate and view breadcrumb trails for draft or private posts by manipulating the post_id parameter, revealing post titles and hierarchy that should remain hidden.
AI Analysis
Technical Summary
CVE-2025-13842 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Breadcrumb NavXT plugin for WordPress, specifically versions up to and including 7.5.0. The root cause lies in the Gutenberg block renderer component of the plugin, located in includes/blocks/build/breadcrumb-trail/render.php, which improperly trusts the 'post_id' parameter obtained from the global $_REQUEST array without validating the requester's authorization to access the referenced post. This parameter can be manipulated by unauthenticated attackers to specify arbitrary post IDs, including those of draft or private posts that should not be publicly accessible. As a result, attackers can enumerate these posts and retrieve breadcrumb trail data, which includes post titles and their hierarchical structure within the site. While the vulnerability does not allow modification or deletion of content (integrity) nor disrupt service availability, it leaks sensitive information that could aid further reconnaissance or targeted attacks. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. No patches or exploits are currently publicly available, but the vulnerability has been officially published and should be addressed promptly by site administrators. The affected versions are all versions up to 7.5.0, and the issue stems from insufficient access control checks in the plugin's code handling the Gutenberg block rendering.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of unpublished or private content managed via WordPress sites using the Breadcrumb NavXT plugin. Exposure of draft or private post titles and their hierarchical context can lead to information leakage, potentially revealing sensitive business plans, internal communications, or unpublished product details. This could facilitate social engineering, competitive intelligence gathering, or targeted phishing campaigns. Although the vulnerability does not directly compromise system integrity or availability, the unauthorized disclosure of internal content can damage organizational reputation and trust, especially under stringent European data protection regulations such as GDPR. Organizations in sectors with high confidentiality requirements—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic scanning and data harvesting by malicious actors. The impact is thus moderate but significant in environments where content confidentiality is critical.
Mitigation Recommendations
To mitigate CVE-2025-13842, European organizations should immediately update the Breadcrumb NavXT plugin to a version where this vulnerability is fixed once available. In the absence of an official patch, administrators can implement temporary mitigations such as restricting access to the Gutenberg block rendering endpoint via web application firewalls (WAFs) or server-level access controls to trusted users only. Reviewing and hardening WordPress permissions to ensure that draft and private posts are not accessible to unauthenticated users is also advisable. Additionally, monitoring web server logs for unusual requests containing 'post_id' parameters targeting the vulnerable plugin paths can help detect exploitation attempts. Organizations should also consider disabling or replacing the Breadcrumb NavXT plugin if it is not essential, or applying custom code patches to validate user authorization before rendering breadcrumb trails. Finally, maintaining regular backups and conducting security audits on WordPress plugins can prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-13842: CWE-639 Authorization Bypass Through User-Controlled Key in mtekk Breadcrumb NavXT
Description
The Breadcrumb NavXT plugin for WordPress is vulnerable to authorization bypass through user-controlled key in versions up to and including 7.5.0. This is due to the Gutenberg block renderer trusting the $_REQUEST['post_id'] parameter without verification in the includes/blocks/build/breadcrumb-trail/render.php file. This makes it possible for unauthenticated attackers to enumerate and view breadcrumb trails for draft or private posts by manipulating the post_id parameter, revealing post titles and hierarchy that should remain hidden.
AI-Powered Analysis
Technical Analysis
CVE-2025-13842 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Breadcrumb NavXT plugin for WordPress, specifically versions up to and including 7.5.0. The root cause lies in the Gutenberg block renderer component of the plugin, located in includes/blocks/build/breadcrumb-trail/render.php, which improperly trusts the 'post_id' parameter obtained from the global $_REQUEST array without validating the requester's authorization to access the referenced post. This parameter can be manipulated by unauthenticated attackers to specify arbitrary post IDs, including those of draft or private posts that should not be publicly accessible. As a result, attackers can enumerate these posts and retrieve breadcrumb trail data, which includes post titles and their hierarchical structure within the site. While the vulnerability does not allow modification or deletion of content (integrity) nor disrupt service availability, it leaks sensitive information that could aid further reconnaissance or targeted attacks. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. No patches or exploits are currently publicly available, but the vulnerability has been officially published and should be addressed promptly by site administrators. The affected versions are all versions up to 7.5.0, and the issue stems from insufficient access control checks in the plugin's code handling the Gutenberg block rendering.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of unpublished or private content managed via WordPress sites using the Breadcrumb NavXT plugin. Exposure of draft or private post titles and their hierarchical context can lead to information leakage, potentially revealing sensitive business plans, internal communications, or unpublished product details. This could facilitate social engineering, competitive intelligence gathering, or targeted phishing campaigns. Although the vulnerability does not directly compromise system integrity or availability, the unauthorized disclosure of internal content can damage organizational reputation and trust, especially under stringent European data protection regulations such as GDPR. Organizations in sectors with high confidentiality requirements—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic scanning and data harvesting by malicious actors. The impact is thus moderate but significant in environments where content confidentiality is critical.
Mitigation Recommendations
To mitigate CVE-2025-13842, European organizations should immediately update the Breadcrumb NavXT plugin to a version where this vulnerability is fixed once available. In the absence of an official patch, administrators can implement temporary mitigations such as restricting access to the Gutenberg block rendering endpoint via web application firewalls (WAFs) or server-level access controls to trusted users only. Reviewing and hardening WordPress permissions to ensure that draft and private posts are not accessible to unauthenticated users is also advisable. Additionally, monitoring web server logs for unusual requests containing 'post_id' parameters targeting the vulnerable plugin paths can help detect exploitation attempts. Organizations should also consider disabling or replacing the Breadcrumb NavXT plugin if it is not essential, or applying custom code patches to validate user authorization before rendering breadcrumb trails. Finally, maintaining regular backups and conducting security audits on WordPress plugins can prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T18:55:52.648Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f36aea4a407a3be043
Added to database: 2/19/2026, 4:56:19 AM
Last enriched: 2/19/2026, 5:30:34 AM
Last updated: 2/21/2026, 12:19:39 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.