CVE-2025-14895: CWE-862 Missing Authorization in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
The PopupKit plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.2.0. This is due to the plugin not properly verifying that a user is authorized to access the /popup/logs REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete analytics data including device types, browser information, countries, referrer URLs, and campaign metrics.
AI Analysis
Technical Summary
CVE-2025-14895 identifies an authorization bypass vulnerability in the PopupKit WordPress plugin, which provides features like gamification, multi-step popups, page-level targeting, and WooCommerce triggers. The vulnerability exists because the plugin fails to properly verify that a user is authorized to access the /popup/logs REST API endpoint. This endpoint exposes analytics data including device types, browser information, countries, referrer URLs, and campaign metrics. The flaw affects all versions up to and including 2.2.0. An attacker with authenticated access at the Subscriber level or higher can exploit this vulnerability to read and delete sensitive analytics data without proper permissions. The vulnerability is classified under CWE-862 (Missing Authorization). The CVSS v3.1 base score is 5.4, indicating a medium severity with network attack vector, low attack complexity, requiring privileges, no user interaction, and impacting confidentiality and integrity but not availability. No public exploits are currently known, and no patches have been linked yet. The vulnerability could be leveraged to undermine marketing analytics, potentially affecting business decisions and user privacy. Since the vulnerability requires at least Subscriber-level authentication, it is not exploitable by unauthenticated attackers but remains a significant risk if user accounts are compromised or if low-privilege users are malicious.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure and potential deletion of sensitive analytics data collected by the PopupKit plugin. Organizations relying on this data for marketing campaigns, user behavior analysis, or operational insights may suffer from data integrity loss and reduced visibility into their website performance. Attackers could manipulate or erase analytics to cover tracks or disrupt marketing efforts. While the vulnerability does not directly affect website availability or core functionality, the breach of confidentiality and integrity of analytics data can lead to misguided business decisions and loss of trust. Additionally, if attackers gain access to user behavior and geographic data, it could facilitate further targeted attacks or privacy violations. The requirement for authenticated access limits the scope somewhat, but compromised or malicious low-privilege accounts could still exploit this flaw. This risk is particularly relevant for e-commerce sites and businesses using WooCommerce integrations, where marketing analytics are critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for updates or patches from the plugin vendor and apply them promptly once available. Until a patch is released, administrators should restrict access to the /popup/logs REST API endpoint by implementing additional access controls at the web server or application firewall level, limiting it to trusted roles or IP addresses. Review and minimize the number of users with Subscriber-level or higher access, enforcing the principle of least privilege. Enable multi-factor authentication (MFA) for all WordPress accounts to reduce the risk of account compromise. Regularly audit user accounts and permissions to detect unauthorized privilege escalations. Consider disabling or replacing the PopupKit plugin if it is not essential or if a timely patch is not forthcoming. Additionally, monitor logs for unusual access patterns to the REST API endpoints and set up alerts for suspicious activity related to analytics data access or deletion.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2025-14895: CWE-862 Missing Authorization in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
Description
The PopupKit plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.2.0. This is due to the plugin not properly verifying that a user is authorized to access the /popup/logs REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete analytics data including device types, browser information, countries, referrer URLs, and campaign metrics.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14895 identifies an authorization bypass vulnerability in the PopupKit WordPress plugin, which provides features like gamification, multi-step popups, page-level targeting, and WooCommerce triggers. The vulnerability exists because the plugin fails to properly verify that a user is authorized to access the /popup/logs REST API endpoint. This endpoint exposes analytics data including device types, browser information, countries, referrer URLs, and campaign metrics. The flaw affects all versions up to and including 2.2.0. An attacker with authenticated access at the Subscriber level or higher can exploit this vulnerability to read and delete sensitive analytics data without proper permissions. The vulnerability is classified under CWE-862 (Missing Authorization). The CVSS v3.1 base score is 5.4, indicating a medium severity with network attack vector, low attack complexity, requiring privileges, no user interaction, and impacting confidentiality and integrity but not availability. No public exploits are currently known, and no patches have been linked yet. The vulnerability could be leveraged to undermine marketing analytics, potentially affecting business decisions and user privacy. Since the vulnerability requires at least Subscriber-level authentication, it is not exploitable by unauthenticated attackers but remains a significant risk if user accounts are compromised or if low-privilege users are malicious.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure and potential deletion of sensitive analytics data collected by the PopupKit plugin. Organizations relying on this data for marketing campaigns, user behavior analysis, or operational insights may suffer from data integrity loss and reduced visibility into their website performance. Attackers could manipulate or erase analytics to cover tracks or disrupt marketing efforts. While the vulnerability does not directly affect website availability or core functionality, the breach of confidentiality and integrity of analytics data can lead to misguided business decisions and loss of trust. Additionally, if attackers gain access to user behavior and geographic data, it could facilitate further targeted attacks or privacy violations. The requirement for authenticated access limits the scope somewhat, but compromised or malicious low-privilege accounts could still exploit this flaw. This risk is particularly relevant for e-commerce sites and businesses using WooCommerce integrations, where marketing analytics are critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for updates or patches from the plugin vendor and apply them promptly once available. Until a patch is released, administrators should restrict access to the /popup/logs REST API endpoint by implementing additional access controls at the web server or application firewall level, limiting it to trusted roles or IP addresses. Review and minimize the number of users with Subscriber-level or higher access, enforcing the principle of least privilege. Enable multi-factor authentication (MFA) for all WordPress accounts to reduce the risk of account compromise. Regularly audit user accounts and permissions to detect unauthorized privilege escalations. Consider disabling or replacing the PopupKit plugin if it is not essential or if a timely patch is not forthcoming. Additionally, monitor logs for unusual access patterns to the REST API endpoints and set up alerts for suspicious activity related to analytics data access or deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-18T16:04:05.446Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698afe6e4b57a58fa1f900f6
Added to database: 2/10/2026, 9:46:22 AM
Last enriched: 2/27/2026, 11:42:22 AM
Last updated: 4/4/2026, 11:56:36 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.