Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14395: CWE-862 Missing Authorization in melodicmedia Popover Windows

0
Medium
VulnerabilityCVE-2025-14395cvecve-2025-14395cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:20 UTC)
Source: CVE Database V5
Vendor/Project: melodicmedia
Product: Popover Windows

Description

The Popover Windows plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple ajax actions (e.g., pop_submit, poptheme_submit) in all versions up to, and including, 1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the plugin's settings and content.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:13:36 UTC

Technical Analysis

CVE-2025-14395 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Popover Windows plugin for WordPress, developed by melodicmedia. This plugin, up to and including version 1.2, fails to perform proper capability checks on several AJAX actions such as 'pop_submit' and 'poptheme_submit'. These AJAX endpoints are accessible to authenticated users with subscriber-level privileges or higher, allowing them to modify plugin settings and content without the appropriate authorization. The vulnerability arises because the plugin does not verify whether the requesting user has sufficient permissions before processing these AJAX requests, leading to unauthorized modification of data. The flaw does not expose confidential information or disrupt service availability but compromises the integrity of the plugin’s configuration and content. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requires privileges (PR:L) but no user interaction (UI:N), and affects only the integrity (I:L) of the system without impacting confidentiality or availability. No patches or known exploits have been reported at the time of disclosure. This vulnerability is significant because subscriber-level access is commonly granted to registered users on WordPress sites, which broadens the potential attacker base beyond administrators or editors. Attackers could leverage this to alter plugin behavior, potentially facilitating further attacks or defacement.

Potential Impact

The primary impact of CVE-2025-14395 is unauthorized modification of plugin settings and content, which compromises data integrity. Attackers with subscriber-level access can alter the appearance or behavior of popover windows, potentially misleading site visitors or injecting malicious content. While confidentiality and availability remain unaffected, integrity violations can undermine trust in the affected websites and lead to reputational damage. For organizations relying on the Popover Windows plugin, this could result in defacement, misinformation, or indirect facilitation of more severe attacks if combined with other vulnerabilities. The ease of exploitation by low-privileged authenticated users increases the risk, especially on sites with large user bases or where subscriber accounts are easily obtained. Although no known exploits are reported, the vulnerability could be exploited in targeted attacks or by malicious insiders. The scope is limited to WordPress sites using this specific plugin, but given WordPress’s global popularity, the potential impact is widespread.

Mitigation Recommendations

To mitigate CVE-2025-14395, organizations should immediately verify if they use the Popover Windows plugin version 1.2 or earlier and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict subscriber-level user capabilities to prevent unauthorized access to plugin AJAX actions. This can be done by implementing custom capability checks or using security plugins that enforce granular permission controls on AJAX endpoints. Additionally, monitoring and logging AJAX requests related to the plugin can help detect suspicious activity. Site owners should also review user roles and permissions to minimize the number of users with subscriber or higher access. Employing a web application firewall (WAF) with rules targeting unauthorized AJAX requests may provide temporary protection. Finally, educating users about the risks of account compromise and enforcing strong authentication policies can reduce the likelihood of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T22:14:48.782Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a503d

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 2/27/2026, 11:13:36 AM

Last updated: 3/24/2026, 10:16:46 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses