Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14367: CWE-862 Missing Authorization in corsonr Easy Theme Options

0
Medium
VulnerabilityCVE-2025-14367cvecve-2025-14367cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:28 UTC)
Source: CVE Database V5
Vendor/Project: corsonr
Product: Easy Theme Options

Description

The Easy Theme Options plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0. This is due to missing authorization checks in the eto_import_settings function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import arbitrary plugin settings via the 'eto_import_settings' parameter.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:04:01 UTC

Technical Analysis

CVE-2025-14367 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Easy Theme Options plugin developed by corsonr for WordPress. The issue exists in all versions up to and including 1.0 due to the eto_import_settings function lacking proper authorization checks. This function processes the 'eto_import_settings' parameter, which allows importing plugin settings. Because authorization is missing, any authenticated user with at least Subscriber-level privileges can invoke this function to import arbitrary settings, potentially altering the plugin's configuration without proper permission. The vulnerability does not require elevated privileges beyond Subscriber, no user interaction, and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that while confidentiality and availability are unaffected, integrity can be compromised. No patches or known exploits are currently reported, but the risk lies in unauthorized configuration changes that could lead to further security issues or site misbehavior. The vulnerability is particularly relevant for WordPress sites using this plugin, which may be targeted by attackers seeking to manipulate site behavior or escalate privileges indirectly.

Potential Impact

For European organizations, the impact primarily concerns the integrity of WordPress sites using the Easy Theme Options plugin. Unauthorized import of plugin settings can lead to misconfiguration, potentially enabling further exploitation or disrupting site functionality. While confidentiality and availability are not directly affected, integrity compromises can undermine trust in the affected websites and may facilitate subsequent attacks such as privilege escalation or injection of malicious code through manipulated settings. Organizations relying on WordPress for public-facing websites, e-commerce, or internal portals could face reputational damage and operational disruptions. The medium severity score indicates a moderate risk that should not be ignored, especially in sectors with high regulatory requirements for website integrity and security, such as finance, healthcare, and government. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

1. Immediately restrict access to the Easy Theme Options plugin settings to trusted administrators only, ensuring Subscriber-level users cannot access or invoke import functions. 2. Monitor user roles and permissions regularly to detect any unauthorized privilege escalations or suspicious activities related to plugin settings. 3. Implement web application firewalls (WAF) rules to detect and block requests containing the 'eto_import_settings' parameter from unauthorized users. 4. Keep WordPress core and all plugins updated; apply patches from the vendor as soon as they are released for this vulnerability. 5. Conduct regular security audits and penetration testing focusing on plugin configurations and authorization controls. 6. Educate site administrators about the risks of granting unnecessary permissions to low-privilege users. 7. Consider disabling or replacing the Easy Theme Options plugin if it is not essential or if no timely patch is available. 8. Use logging and alerting mechanisms to track changes to plugin settings and investigate anomalies promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T18:27:20.965Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5030

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/13/2025, 5:04:01 AM

Last updated: 12/14/2025, 10:24:58 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats