CVE-2025-13866: CWE-862 Missing Authorization in looks_awesome Flow-Flow Social Feed Stream
The Flow-Flow Social Feed Stream plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the flow_flow_social_auth AJAX action in versions 3.0.0 to 4.7.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify plugin settings and store arbitrary JavaScript that executes whenever the plugin settings page is viewed.
AI Analysis
Technical Summary
CVE-2025-13866 is a vulnerability identified in the Flow-Flow Social Feed Stream plugin for WordPress, affecting versions 3.0.0 through 4.7.5. The root cause is a missing authorization check (CWE-862) on the AJAX action 'flow_flow_social_auth', which allows authenticated users with minimal privileges (Subscriber-level or higher) to modify plugin settings without proper capability verification. This unauthorized modification capability enables attackers to store arbitrary JavaScript code within the plugin’s settings. The malicious JavaScript executes whenever the plugin settings page is accessed, potentially allowing for cross-site scripting (XSS) attacks or other client-side exploits. The vulnerability is exploitable remotely over the network without user interaction, with low attack complexity and requiring only authenticated access. The CVSS 3.1 base score is 6.4, indicating a medium severity level with partial impacts on confidentiality and integrity but no impact on availability. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s initial privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2025, and assigned by Wordfence. The plugin is widely used to aggregate social media feeds on WordPress sites, making this vulnerability relevant for many organizations relying on this plugin for social media integration.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity and confidentiality of WordPress sites using the Flow-Flow Social Feed Stream plugin. Attackers with low-level authenticated access can inject malicious JavaScript, potentially leading to session hijacking, credential theft, or further exploitation of site visitors or administrators. This can damage organizational reputation, lead to data breaches, and facilitate lateral movement within the network if administrative accounts are compromised. The vulnerability does not directly impact availability but can indirectly cause service disruption if exploited for broader attacks. Organizations with multi-user WordPress environments, such as media companies, e-commerce sites, and public sector websites, are particularly vulnerable. The risk is heightened in environments where subscriber or low-privilege accounts are easily created or compromised. Given the plugin’s network exposure and the lack of user interaction required, exploitation could be automated or integrated into broader attack campaigns targeting WordPress infrastructure in Europe.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the WordPress admin area and specifically the plugin settings page to trusted users only. Implement strict role-based access controls to ensure only necessary users have access to the plugin’s configuration. Monitor and audit user accounts with Subscriber-level privileges to detect suspicious activity. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting 'flow_flow_social_auth'. Disable or remove the Flow-Flow Social Feed Stream plugin if it is not essential until a security patch is released. Once a patch becomes available, promptly update the plugin to a secure version that includes proper authorization checks. Additionally, implement Content Security Policy (CSP) headers to mitigate the impact of injected JavaScript. Regularly review and harden WordPress security configurations, including limiting plugin installations and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all users with access to the admin area.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13866: CWE-862 Missing Authorization in looks_awesome Flow-Flow Social Feed Stream
Description
The Flow-Flow Social Feed Stream plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the flow_flow_social_auth AJAX action in versions 3.0.0 to 4.7.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify plugin settings and store arbitrary JavaScript that executes whenever the plugin settings page is viewed.
AI-Powered Analysis
Technical Analysis
CVE-2025-13866 is a vulnerability identified in the Flow-Flow Social Feed Stream plugin for WordPress, affecting versions 3.0.0 through 4.7.5. The root cause is a missing authorization check (CWE-862) on the AJAX action 'flow_flow_social_auth', which allows authenticated users with minimal privileges (Subscriber-level or higher) to modify plugin settings without proper capability verification. This unauthorized modification capability enables attackers to store arbitrary JavaScript code within the plugin’s settings. The malicious JavaScript executes whenever the plugin settings page is accessed, potentially allowing for cross-site scripting (XSS) attacks or other client-side exploits. The vulnerability is exploitable remotely over the network without user interaction, with low attack complexity and requiring only authenticated access. The CVSS 3.1 base score is 6.4, indicating a medium severity level with partial impacts on confidentiality and integrity but no impact on availability. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s initial privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2025, and assigned by Wordfence. The plugin is widely used to aggregate social media feeds on WordPress sites, making this vulnerability relevant for many organizations relying on this plugin for social media integration.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity and confidentiality of WordPress sites using the Flow-Flow Social Feed Stream plugin. Attackers with low-level authenticated access can inject malicious JavaScript, potentially leading to session hijacking, credential theft, or further exploitation of site visitors or administrators. This can damage organizational reputation, lead to data breaches, and facilitate lateral movement within the network if administrative accounts are compromised. The vulnerability does not directly impact availability but can indirectly cause service disruption if exploited for broader attacks. Organizations with multi-user WordPress environments, such as media companies, e-commerce sites, and public sector websites, are particularly vulnerable. The risk is heightened in environments where subscriber or low-privilege accounts are easily created or compromised. Given the plugin’s network exposure and the lack of user interaction required, exploitation could be automated or integrated into broader attack campaigns targeting WordPress infrastructure in Europe.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the WordPress admin area and specifically the plugin settings page to trusted users only. Implement strict role-based access controls to ensure only necessary users have access to the plugin’s configuration. Monitor and audit user accounts with Subscriber-level privileges to detect suspicious activity. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting 'flow_flow_social_auth'. Disable or remove the Flow-Flow Social Feed Stream plugin if it is not essential until a security patch is released. Once a patch becomes available, promptly update the plugin to a secure version that includes proper authorization checks. Additionally, implement Content Security Policy (CSP) headers to mitigate the impact of injected JavaScript. Regularly review and harden WordPress security configurations, including limiting plugin installations and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all users with access to the admin area.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T22:55:17.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9185650da22753edbcca
Added to database: 12/12/2025, 3:52:37 AM
Last enriched: 12/12/2025, 4:11:45 AM
Last updated: 12/14/2025, 2:55:21 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14640: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14639: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14638: SQL Injection in itsourcecode Online Pet Shop Management System
MediumCVE-2025-13832
UnknownCVE-2025-14637: SQL Injection in itsourcecode Online Pet Shop Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.