CVE-2025-14351: CWE-862 Missing Authorization in brainstormforce Custom Fonts – Host Your Fonts Locally
CVE-2025-14351 is a medium-severity vulnerability in the WordPress plugin 'Custom Fonts – Host Your Fonts Locally' by Brainstormforce. It arises from a missing authorization check in the BCF_Google_Fonts_Compatibility class constructor, allowing unauthenticated attackers to delete the font directory and modify the theme. json file. This vulnerability affects all versions up to and including 2. 1. 16. Exploitation does not require user interaction or authentication and can lead to integrity loss of website files, potentially disrupting site appearance or functionality. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and impact on site integrity warrant prompt attention. European organizations using this plugin on WordPress sites, especially those with public-facing websites relying on custom fonts, are at risk. Mitigation involves updating the plugin once a patch is available or applying manual access control measures to restrict unauthorized file operations.
AI Analysis
Technical Summary
CVE-2025-14351 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Custom Fonts – Host Your Fonts Locally' developed by Brainstormforce. The flaw exists in the constructor function of the BCF_Google_Fonts_Compatibility class, where a critical capability check is missing. This omission allows unauthenticated attackers to perform unauthorized operations, specifically deleting the font directory and rewriting the theme.json file. The plugin is widely used to host custom fonts locally on WordPress sites, enhancing performance and privacy by avoiding external font calls. The vulnerability affects all plugin versions up to 2.1.16, with no authentication or user interaction required, making it remotely exploitable over the network. The impact primarily concerns integrity, as attackers can alter or remove font files and modify theme configuration, potentially causing website display issues or defacement. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability's nature suggests it could be leveraged for website disruption or as part of a broader attack chain. The lack of a patch at the time of reporting increases the urgency for mitigation through alternative controls.
Potential Impact
For European organizations, the vulnerability poses a risk to the integrity of WordPress-based websites using the affected plugin. Unauthorized deletion of font directories and modification of theme.json can lead to website defacement, broken layouts, or degraded user experience, potentially damaging brand reputation and customer trust. E-commerce platforms, media outlets, and public sector websites relying on custom fonts for branding are particularly vulnerable. While confidentiality and availability impacts are minimal, the integrity compromise could facilitate further attacks, such as injecting malicious content or disrupting site operations. The ease of exploitation without authentication increases the threat level, especially for organizations with publicly accessible WordPress sites. Given the widespread use of WordPress in Europe, the vulnerability could affect a significant number of sites, leading to potential operational disruptions and increased incident response costs.
Mitigation Recommendations
Until an official patch is released, European organizations should implement the following specific mitigations: 1) Restrict file system permissions for the WordPress installation, especially the font directories and theme.json file, to prevent unauthorized write or delete operations by the web server user. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin's endpoints or actions related to font management. 3) Monitor file integrity using tools like WordPress file monitoring plugins or external solutions to detect unauthorized changes promptly. 4) Disable or remove the 'Custom Fonts – Host Your Fonts Locally' plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization checks. 5) Keep WordPress core and all plugins updated and subscribe to vulnerability advisories for timely patch application. 6) Conduct regular security audits focusing on plugin permissions and access controls to ensure no unauthorized modifications are possible. These steps go beyond generic advice by focusing on access control hardening and proactive monitoring tailored to the specific vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-14351: CWE-862 Missing Authorization in brainstormforce Custom Fonts – Host Your Fonts Locally
Description
CVE-2025-14351 is a medium-severity vulnerability in the WordPress plugin 'Custom Fonts – Host Your Fonts Locally' by Brainstormforce. It arises from a missing authorization check in the BCF_Google_Fonts_Compatibility class constructor, allowing unauthenticated attackers to delete the font directory and modify the theme. json file. This vulnerability affects all versions up to and including 2. 1. 16. Exploitation does not require user interaction or authentication and can lead to integrity loss of website files, potentially disrupting site appearance or functionality. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and impact on site integrity warrant prompt attention. European organizations using this plugin on WordPress sites, especially those with public-facing websites relying on custom fonts, are at risk. Mitigation involves updating the plugin once a patch is available or applying manual access control measures to restrict unauthorized file operations.
AI-Powered Analysis
Technical Analysis
CVE-2025-14351 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Custom Fonts – Host Your Fonts Locally' developed by Brainstormforce. The flaw exists in the constructor function of the BCF_Google_Fonts_Compatibility class, where a critical capability check is missing. This omission allows unauthenticated attackers to perform unauthorized operations, specifically deleting the font directory and rewriting the theme.json file. The plugin is widely used to host custom fonts locally on WordPress sites, enhancing performance and privacy by avoiding external font calls. The vulnerability affects all plugin versions up to 2.1.16, with no authentication or user interaction required, making it remotely exploitable over the network. The impact primarily concerns integrity, as attackers can alter or remove font files and modify theme configuration, potentially causing website display issues or defacement. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability's nature suggests it could be leveraged for website disruption or as part of a broader attack chain. The lack of a patch at the time of reporting increases the urgency for mitigation through alternative controls.
Potential Impact
For European organizations, the vulnerability poses a risk to the integrity of WordPress-based websites using the affected plugin. Unauthorized deletion of font directories and modification of theme.json can lead to website defacement, broken layouts, or degraded user experience, potentially damaging brand reputation and customer trust. E-commerce platforms, media outlets, and public sector websites relying on custom fonts for branding are particularly vulnerable. While confidentiality and availability impacts are minimal, the integrity compromise could facilitate further attacks, such as injecting malicious content or disrupting site operations. The ease of exploitation without authentication increases the threat level, especially for organizations with publicly accessible WordPress sites. Given the widespread use of WordPress in Europe, the vulnerability could affect a significant number of sites, leading to potential operational disruptions and increased incident response costs.
Mitigation Recommendations
Until an official patch is released, European organizations should implement the following specific mitigations: 1) Restrict file system permissions for the WordPress installation, especially the font directories and theme.json file, to prevent unauthorized write or delete operations by the web server user. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin's endpoints or actions related to font management. 3) Monitor file integrity using tools like WordPress file monitoring plugins or external solutions to detect unauthorized changes promptly. 4) Disable or remove the 'Custom Fonts – Host Your Fonts Locally' plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization checks. 5) Keep WordPress core and all plugins updated and subscribe to vulnerability advisories for timely patch application. 6) Conduct regular security audits focusing on plugin permissions and access controls to ensure no unauthorized modifications are possible. These steps go beyond generic advice by focusing on access control hardening and proactive monitoring tailored to the specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-09T16:10:20.040Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696eff234623b1157c12c80a
Added to database: 1/20/2026, 4:05:55 AM
Last enriched: 1/27/2026, 8:21:05 PM
Last updated: 2/7/2026, 12:52:02 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.