Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13866: CWE-862 Missing Authorization in looks_awesome Flow-Flow Social Feed Stream

0
Medium
VulnerabilityCVE-2025-13866cvecve-2025-13866cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:37 UTC)
Source: CVE Database V5
Vendor/Project: looks_awesome
Product: Flow-Flow Social Feed Stream

Description

The Flow-Flow Social Feed Stream plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the flow_flow_social_auth AJAX action in versions 3.0.0 to 4.7.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify plugin settings and store arbitrary JavaScript that executes whenever the plugin settings page is viewed.

AI-Powered Analysis

AILast updated: 12/12/2025, 04:11:45 UTC

Technical Analysis

CVE-2025-13866 is a vulnerability identified in the Flow-Flow Social Feed Stream plugin for WordPress, affecting versions 3.0.0 through 4.7.5. The root cause is a missing authorization check (CWE-862) on the AJAX action 'flow_flow_social_auth', which allows authenticated users with minimal privileges (Subscriber-level or higher) to modify plugin settings without proper capability verification. This unauthorized modification capability enables attackers to store arbitrary JavaScript code within the plugin’s settings. The malicious JavaScript executes whenever the plugin settings page is accessed, potentially allowing for cross-site scripting (XSS) attacks or other client-side exploits. The vulnerability is exploitable remotely over the network without user interaction, with low attack complexity and requiring only authenticated access. The CVSS 3.1 base score is 6.4, indicating a medium severity level with partial impacts on confidentiality and integrity but no impact on availability. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s initial privileges. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2025, and assigned by Wordfence. The plugin is widely used to aggregate social media feeds on WordPress sites, making this vulnerability relevant for many organizations relying on this plugin for social media integration.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and confidentiality of WordPress sites using the Flow-Flow Social Feed Stream plugin. Attackers with low-level authenticated access can inject malicious JavaScript, potentially leading to session hijacking, credential theft, or further exploitation of site visitors or administrators. This can damage organizational reputation, lead to data breaches, and facilitate lateral movement within the network if administrative accounts are compromised. The vulnerability does not directly impact availability but can indirectly cause service disruption if exploited for broader attacks. Organizations with multi-user WordPress environments, such as media companies, e-commerce sites, and public sector websites, are particularly vulnerable. The risk is heightened in environments where subscriber or low-privilege accounts are easily created or compromised. Given the plugin’s network exposure and the lack of user interaction required, exploitation could be automated or integrated into broader attack campaigns targeting WordPress infrastructure in Europe.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the WordPress admin area and specifically the plugin settings page to trusted users only. Implement strict role-based access controls to ensure only necessary users have access to the plugin’s configuration. Monitor and audit user accounts with Subscriber-level privileges to detect suspicious activity. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting 'flow_flow_social_auth'. Disable or remove the Flow-Flow Social Feed Stream plugin if it is not essential until a security patch is released. Once a patch becomes available, promptly update the plugin to a secure version that includes proper authorization checks. Additionally, implement Content Security Policy (CSP) headers to mitigate the impact of injected JavaScript. Regularly review and harden WordPress security configurations, including limiting plugin installations and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all users with access to the admin area.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-01T22:55:17.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9185650da22753edbcca

Added to database: 12/12/2025, 3:52:37 AM

Last enriched: 12/12/2025, 4:11:45 AM

Last updated: 12/14/2025, 2:55:21 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats