Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14447: CWE-862 Missing Authorization in pcantoni AnnunciFunebri Impresa

0
Medium
VulnerabilityCVE-2025-14447cvecve-2025-14447cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:22 UTC)
Source: CVE Database V5
Vendor/Project: pcantoni
Product: AnnunciFunebri Impresa

Description

The AnnunciFunebri Impresa plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the annfu_reset_options() function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all 29 plugin options, effectively resetting the plugin to its default state.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:16:44 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14447 affects the AnnunciFunebri Impresa plugin for WordPress, developed by pcantoni, in all versions up to and including 4.7.0. The root cause is a missing authorization check (CWE-862) in the annfu_reset_options() function. This function is responsible for resetting the plugin's configuration by deleting all 29 plugin options stored in the WordPress database. Due to the lack of capability verification, any authenticated user with Subscriber-level access or higher can invoke this function and reset the plugin settings without proper permissions. The vulnerability does not require elevated privileges beyond basic authentication, nor does it require user interaction beyond logging in. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation over the network without privileges but limited impact to integrity only, with no confidentiality or availability effects. While no public exploits are known, the vulnerability could be leveraged by attackers to disrupt site functionality or prepare for further attacks by resetting plugin configurations. The absence of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for mitigation strategies.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of plugin configuration, which can lead to loss of customized settings and potential disruption of the plugin's intended functionality on affected WordPress sites. For organizations relying on the AnnunciFunebri Impresa plugin, this could result in degraded user experience, loss of critical business data related to funeral announcements, or operational interruptions. Although the vulnerability does not directly compromise confidentiality or availability, resetting plugin options could be used as a stepping stone for further attacks or to cause confusion and administrative overhead. Since exploitation requires only Subscriber-level access, attackers who gain low-level credentials—through phishing, credential stuffing, or other means—can exploit this flaw. This broadens the attack surface and increases risk, especially for sites with multiple users or weak access controls. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for updates from the plugin vendor and apply any available patches promptly once released. In the absence of an official patch, administrators can implement the following specific measures: 1) Restrict Subscriber-level user accounts by reviewing and minimizing user roles and permissions, ensuring that only trusted users have authenticated access. 2) Employ WordPress security plugins or custom code to add capability checks around the annfu_reset_options() function, preventing unauthorized calls. 3) Monitor logs for unusual activity related to plugin option resets or unexpected changes in plugin behavior. 4) Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise. 5) Regularly back up WordPress configurations and plugin settings to enable quick restoration if unauthorized resets occur. 6) Consider temporarily disabling or removing the AnnunciFunebri Impresa plugin if it is not critical until a patch is available. These targeted actions go beyond generic advice by focusing on controlling access and monitoring the specific vulnerable function.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T13:54:13.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef65d977419e584a5094

Added to database: 12/13/2025, 4:45:25 AM

Last enriched: 2/27/2026, 11:16:44 AM

Last updated: 3/24/2026, 4:20:05 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses