Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13950: CWE-862 Missing Authorization in onesignal OneSignal – Web Push Notifications

0
Medium
VulnerabilityCVE-2025-13950cvecve-2025-13950cwe-862
Published: Mon Dec 15 2025 (12/15/2025, 14:25:12 UTC)
Source: CVE Database V5
Vendor/Project: onesignal
Product: OneSignal – Web Push Notifications

Description

CVE-2025-13950 is a medium-severity vulnerability in the OneSignal – Web Push Notifications WordPress plugin (up to version 3. 6. 1) that allows unauthenticated attackers to modify plugin settings due to missing authorization checks. Specifically, the plugin fails to verify user capabilities or nonces when processing POST requests, enabling attackers to overwrite critical configuration parameters such as the OneSignal App ID and REST API key. This vulnerability does not impact confidentiality or availability directly but compromises integrity by allowing unauthorized changes to notification behavior. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, affected sites remain at risk until patched or mitigated. European organizations using this plugin on WordPress sites should prioritize updating or applying mitigations to prevent unauthorized manipulation of push notification configurations, which could lead to misinformation or phishing campaigns. Countries with high WordPress adoption and significant use of OneSignal services, such as Germany, the UK, France, and the Netherlands, are most likely to be impacted. The vulnerability’s CVSS score is 5.

AI-Powered Analysis

AILast updated: 12/22/2025, 15:59:35 UTC

Technical Analysis

CVE-2025-13950 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the OneSignal – Web Push Notifications plugin for WordPress, versions up to and including 3.6.1. The root cause is the absence of proper capability checks and nonce verification when handling POST requests that modify plugin settings. This flaw allows unauthenticated attackers to send crafted POST requests directly to the plugin’s settings endpoint, overwriting critical configuration parameters such as the OneSignal App ID, REST API key, and notification behavior settings. These parameters control how push notifications are sent and authenticated, so unauthorized modification can lead to malicious notifications being sent to subscribers or disruption of legitimate notification flows. The vulnerability does not expose sensitive data directly (no confidentiality impact) nor does it cause denial of service (no availability impact), but it compromises the integrity of the notification system. The attack vector is network-based, requiring no privileges or user interaction, making it straightforward to exploit. Although no public exploits have been reported, the vulnerability’s presence in a widely used WordPress plugin poses a significant risk to websites relying on OneSignal for push notifications. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation balanced against the limited impact scope.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized alteration of web push notification configurations, enabling attackers to send fraudulent or malicious notifications to end users. This can damage brand reputation, facilitate phishing or social engineering attacks, and erode user trust. Organizations relying on push notifications for critical alerts or customer engagement may experience misinformation dissemination or loss of communication control. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can have downstream effects on user security and organizational credibility. Sectors such as e-commerce, media, and public services that use OneSignal for customer or citizen notifications are particularly at risk. Additionally, attackers could leverage this vulnerability as a foothold for further attacks by injecting malicious payloads or redirecting users to malicious sites. The medium severity indicates a moderate risk that should not be ignored, especially given the ease of exploitation and lack of authentication requirements.

Mitigation Recommendations

1. Immediately update the OneSignal – Web Push Notifications plugin to a patched version once available. Monitor vendor announcements for official fixes. 2. Until a patch is released, restrict access to the WordPress admin and plugin endpoints using web application firewalls (WAFs) or IP whitelisting to prevent unauthorized POST requests. 3. Implement additional server-side authorization checks via custom code or security plugins to enforce capability verification and nonce validation on POST requests targeting OneSignal settings. 4. Regularly audit plugin configurations and logs for unauthorized changes or suspicious activity related to push notification settings. 5. Educate site administrators about the risks of unauthorized configuration changes and encourage strong administrative credential policies. 6. Consider temporarily disabling the OneSignal plugin if push notifications are not critical, to eliminate the attack surface. 7. Employ Content Security Policy (CSP) and other browser security controls to mitigate the impact of malicious notifications if they occur. 8. Monitor threat intelligence feeds for emerging exploits targeting this vulnerability to respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T09:44:06.039Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69401ef9d9bcdf3f3de12790

Added to database: 12/15/2025, 2:45:13 PM

Last enriched: 12/22/2025, 3:59:35 PM

Last updated: 2/4/2026, 3:05:49 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats