CVE-2025-14080: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
The Frontend Post Submission Manager Lite plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.5. This is due to missing authorization checks on the post update functionality in the fpsml_form_process AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary posts by providing a post_id parameter via the guest posting form, allowing them to change post titles, content, excerpts, and remove post authors.
AI Analysis
Technical Summary
CVE-2025-14080 is a Missing Authorization vulnerability (CWE-862) found in the Frontend Post Submission Manager Lite – Frontend Posting WordPress plugin, versions up to and including 1.2.5. The vulnerability exists because the plugin fails to perform proper authorization checks on the post update functionality within the fpsml_form_process AJAX action. This flaw allows unauthenticated attackers to submit requests containing a post_id parameter via the guest posting form, enabling them to modify arbitrary posts on the affected WordPress site. Specifically, attackers can alter post titles, content, excerpts, and remove or change post authorship without any authentication or user interaction. The vulnerability is remotely exploitable over the network and does not require any privileges. Although no public exploits have been reported, the ease of exploitation combined with the ability to tamper with post content can lead to misinformation, defacement, or reputational damage. The CVSS v3.1 base score is 5.3, indicating medium severity, with the vector reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. The vulnerability was published on December 21, 2025, and is tracked under CWE-862 (Missing Authorization). No official patches have been linked yet, so mitigation relies on workarounds or plugin updates once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of their WordPress-based websites, especially those relying on the Frontend Post Submission Manager Lite plugin for user-generated content or guest posting. Unauthorized modification of posts can lead to misinformation, defacement, or unauthorized content publication, potentially damaging brand reputation and user trust. Organizations in sectors such as media, education, government, and e-commerce that use this plugin are particularly vulnerable. While confidentiality and availability are not directly impacted, the integrity breach can indirectly affect business operations and compliance with data governance policies. Additionally, manipulated content could be used to distribute malicious links or misinformation, increasing the risk of secondary attacks or regulatory scrutiny under European data protection laws. The lack of authentication requirements and ease of exploitation increase the threat level, making timely mitigation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Frontend Post Submission Manager Lite plugin and verify the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, implementing web application firewall (WAF) rules to block or restrict access to the fpsml_form_process AJAX endpoint can help mitigate unauthorized requests. Monitoring web server logs for suspicious POST requests containing the post_id parameter targeting this endpoint is recommended to detect potential exploitation attempts. Additionally, restricting guest posting capabilities or requiring authentication for post submissions can reduce risk. Organizations should subscribe to vendor notifications for patch releases and apply updates promptly. Regular backups of WordPress content should be maintained to enable recovery from unauthorized modifications. Finally, educating site administrators about this vulnerability and encouraging vigilance against unusual content changes will enhance overall security posture.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14080: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
Description
The Frontend Post Submission Manager Lite plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.5. This is due to missing authorization checks on the post update functionality in the fpsml_form_process AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary posts by providing a post_id parameter via the guest posting form, allowing them to change post titles, content, excerpts, and remove post authors.
AI-Powered Analysis
Technical Analysis
CVE-2025-14080 is a Missing Authorization vulnerability (CWE-862) found in the Frontend Post Submission Manager Lite – Frontend Posting WordPress plugin, versions up to and including 1.2.5. The vulnerability exists because the plugin fails to perform proper authorization checks on the post update functionality within the fpsml_form_process AJAX action. This flaw allows unauthenticated attackers to submit requests containing a post_id parameter via the guest posting form, enabling them to modify arbitrary posts on the affected WordPress site. Specifically, attackers can alter post titles, content, excerpts, and remove or change post authorship without any authentication or user interaction. The vulnerability is remotely exploitable over the network and does not require any privileges. Although no public exploits have been reported, the ease of exploitation combined with the ability to tamper with post content can lead to misinformation, defacement, or reputational damage. The CVSS v3.1 base score is 5.3, indicating medium severity, with the vector reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. The vulnerability was published on December 21, 2025, and is tracked under CWE-862 (Missing Authorization). No official patches have been linked yet, so mitigation relies on workarounds or plugin updates once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of their WordPress-based websites, especially those relying on the Frontend Post Submission Manager Lite plugin for user-generated content or guest posting. Unauthorized modification of posts can lead to misinformation, defacement, or unauthorized content publication, potentially damaging brand reputation and user trust. Organizations in sectors such as media, education, government, and e-commerce that use this plugin are particularly vulnerable. While confidentiality and availability are not directly impacted, the integrity breach can indirectly affect business operations and compliance with data governance policies. Additionally, manipulated content could be used to distribute malicious links or misinformation, increasing the risk of secondary attacks or regulatory scrutiny under European data protection laws. The lack of authentication requirements and ease of exploitation increase the threat level, making timely mitigation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Frontend Post Submission Manager Lite plugin and verify the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, implementing web application firewall (WAF) rules to block or restrict access to the fpsml_form_process AJAX endpoint can help mitigate unauthorized requests. Monitoring web server logs for suspicious POST requests containing the post_id parameter targeting this endpoint is recommended to detect potential exploitation attempts. Additionally, restricting guest posting capabilities or requiring authentication for post submissions can reduce risk. Organizations should subscribe to vendor notifications for patch releases and apply updates promptly. Regular backups of WordPress content should be maintained to enable recovery from unauthorized modifications. Finally, educating site administrators about this vulnerability and encouraging vigilance against unusual content changes will enhance overall security posture.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T22:54:29.575Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69475fa78da8a612760a1ad4
Added to database: 12/21/2025, 2:47:03 AM
Last enriched: 12/21/2025, 3:02:19 AM
Last updated: 12/21/2025, 5:14:23 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighCVE-2025-14992: Stack-based Buffer Overflow in Tenda AC18
HighCVE-2025-9343: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
HighCVE-2025-14991: Cross Site Scripting in Campcodes Complete Online Beauty Parlor Management System
MediumCVE-2025-13693: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Image Photo Gallery Final Tiles Grid
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.