Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14447: CWE-862 Missing Authorization in pcantoni AnnunciFunebri Impresa

0
Medium
VulnerabilityCVE-2025-14447cvecve-2025-14447cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:22 UTC)
Source: CVE Database V5
Vendor/Project: pcantoni
Product: AnnunciFunebri Impresa

Description

The AnnunciFunebri Impresa plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the annfu_reset_options() function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all 29 plugin options, effectively resetting the plugin to its default state.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:03:12 UTC

Technical Analysis

CVE-2025-14447 identifies a missing authorization vulnerability (CWE-862) in the AnnunciFunebri Impresa plugin for WordPress, developed by pcantoni. The flaw exists in the annfu_reset_options() function, which lacks a capability check to verify if the user has permission to reset plugin options. This allows any authenticated user with Subscriber-level privileges or higher to invoke this function and delete all 29 plugin options, resetting the plugin to its default configuration. Since WordPress Subscriber roles are typically assigned to minimally privileged users, this vulnerability significantly lowers the attack barrier. The vulnerability affects all versions up to and including 4.7.0 of the plugin. The CVSS 3.1 base score is 5.3 (medium), with an attack vector of network (remote), low attack complexity, no privileges required beyond authentication, no user interaction, and an impact limited to integrity (modification of data). The vulnerability does not affect confidentiality or availability directly. No public exploits have been reported yet, and no patches are currently linked, indicating that users must monitor vendor updates closely. The vulnerability could be leveraged to disrupt plugin configurations, potentially causing operational issues or loss of customized settings on affected WordPress sites.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of website data managed by the AnnunciFunebri Impresa plugin. Unauthorized resetting of plugin options can disrupt business operations, especially for companies in the funeral services sector relying on this plugin for critical announcements or service management. While it does not directly compromise confidentiality or availability, the loss of configuration can lead to downtime or degraded service quality, impacting customer trust and operational efficiency. Organizations with multiple users having Subscriber or higher roles are at increased risk, as attackers could exploit compromised or low-privilege accounts to trigger the reset. The impact is more pronounced in sectors where the plugin is widely used, and where website reliability is critical for business continuity. Additionally, the lack of known exploits suggests a window of opportunity for attackers before patches are widely deployed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit user roles and permissions on WordPress sites using the AnnunciFunebri Impresa plugin, ensuring that Subscriber-level accounts are tightly controlled and monitored. Restrict plugin management capabilities to trusted users only. Until an official patch is released, consider implementing web application firewall (WAF) rules to detect and block calls to the annfu_reset_options() function from unauthorized users. Employ monitoring and alerting on unusual plugin option resets or configuration changes. Regularly back up plugin configurations and website data to enable quick restoration if unauthorized resets occur. Engage with the plugin vendor or community to obtain or contribute to a patch that adds proper authorization checks. Finally, educate site administrators about the risks of excessive privilege assignments and encourage the principle of least privilege.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T13:54:13.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef65d977419e584a5094

Added to database: 12/13/2025, 4:45:25 AM

Last enriched: 12/13/2025, 5:03:12 AM

Last updated: 12/14/2025, 4:11:03 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats