Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14351: CWE-862 Missing Authorization in brainstormforce Custom Fonts – Host Your Fonts Locally

0
Medium
VulnerabilityCVE-2025-14351cvecve-2025-14351cwe-862
Published: Tue Jan 20 2026 (01/20/2026, 03:25:16 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: Custom Fonts – Host Your Fonts Locally

Description

The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'BCF_Google_Fonts_Compatibility' class constructor function in all versions up to, and including, 2.1.16. This makes it possible for unauthenticated attackers to delete font directory and rewrite theme.json file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:06:30 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14351 affects the 'Custom Fonts – Host Your Fonts Locally' WordPress plugin developed by Brainstormforce. This plugin enables WordPress site administrators to host fonts locally rather than relying on external sources like Google Fonts. The security flaw stems from a missing authorization (capability) check in the constructor function of the BCF_Google_Fonts_Compatibility class. Because this check is absent, unauthenticated attackers can invoke functionality that should be restricted to authorized users. Specifically, attackers can delete the font directory used by the plugin and rewrite the theme.json file, which controls theme settings and appearance. This unauthorized modification can lead to site defacement, broken font rendering, or other integrity issues affecting the website's presentation. The vulnerability affects all plugin versions up to and including 2.1.16, with no patch currently listed. The CVSS 3.1 base score is 5.3, indicating a medium severity level. The vector indicates the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits have been reported in the wild as of the publication date. This vulnerability falls under CWE-862 (Missing Authorization), highlighting the lack of proper access control checks in the plugin's code.

Potential Impact

The primary impact of this vulnerability is unauthorized integrity loss on affected WordPress sites. Attackers can delete font directories, potentially causing font loading failures, and rewrite the theme.json file, which could alter site appearance or break theme functionality. This may result in site defacement, degraded user experience, or loss of brand consistency. While confidentiality and availability are not directly impacted, the integrity compromise can indirectly affect availability if the site becomes unusable or requires restoration. For organizations relying on this plugin, especially those with high-traffic or brand-sensitive websites, the vulnerability could lead to reputational damage and increased operational costs for remediation. Since the attack requires no authentication or user interaction, exploitation can be automated and widespread if attackers target vulnerable sites. However, the lack of known exploits in the wild suggests limited active exploitation currently.

Mitigation Recommendations

1. Immediate mitigation involves updating the 'Custom Fonts – Host Your Fonts Locally' plugin to a patched version once released by Brainstormforce. Monitor official channels for patch announcements. 2. If no patch is available, temporarily disable or uninstall the plugin to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to block unauthorized requests targeting the plugin’s endpoints or the BCF_Google_Fonts_Compatibility class functionality. 4. Restrict file system permissions on the font directory and theme.json file to prevent unauthorized modifications by the web server user. 5. Regularly back up theme.json and font directories to enable quick restoration in case of compromise. 6. Monitor website integrity and logs for suspicious activities related to font files or theme configuration changes. 7. Employ WordPress security plugins that enforce capability checks and detect unauthorized file changes. 8. Educate site administrators on the risks of installing plugins without proper security reviews and encourage minimal plugin usage to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T16:10:20.040Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696eff234623b1157c12c80a

Added to database: 1/20/2026, 4:05:55 AM

Last enriched: 2/27/2026, 11:06:30 AM

Last updated: 3/25/2026, 2:14:27 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses