Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1528: CWE-862 Missing Authorization in Search & Filter Search & Filter Pro

0
Medium
VulnerabilityCVE-2025-1528cvecve-2025-1528cwe-862
Published: Fri Mar 14 2025 (03/14/2025, 04:22:32 UTC)
Source: CVE Database V5
Vendor/Project: Search & Filter
Product: Search & Filter Pro

Description

CVE-2025-1528 is a medium severity vulnerability in the Search & Filter Pro WordPress plugin, affecting all versions up to 2. 5. 19. The flaw is due to a missing authorization check in the 'get_meta_values' function, allowing authenticated users with Subscriber-level access or higher to read arbitrary post meta data. This unauthorized data access can expose sensitive information stored in post metadata without requiring user interaction. The vulnerability does not impact data integrity or availability and requires at least low-level authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure. The vulnerability primarily affects WordPress sites using this plugin, which are common in countries with high WordPress adoption. Given the ease of exploitation and scope, the severity is rated medium.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:02:48 UTC

Technical Analysis

CVE-2025-1528 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Search & Filter Pro plugin for WordPress, a widely used plugin that enhances search and filtering capabilities on WordPress sites. The vulnerability arises because the 'get_meta_values' function lacks proper capability checks, meaning it does not verify whether the requesting user has the appropriate permissions to access certain post meta data. As a result, any authenticated user with Subscriber-level privileges or higher can exploit this flaw to retrieve arbitrary post meta values, which may include sensitive or confidential information stored as metadata. This issue affects all versions of the plugin up to and including version 2.5.19. The vulnerability is remotely exploitable over the network without user interaction, requiring only low-level authenticated access (Subscriber or above). The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited impact on confidentiality, no impact on integrity or availability, and the requirement for authentication. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the exposure of sensitive metadata could lead to information disclosure risks, especially if the metadata contains private or security-related information. The vulnerability underscores the importance of implementing proper authorization checks in plugin functions that expose data endpoints.

Potential Impact

The primary impact of CVE-2025-1528 is unauthorized disclosure of post meta data on WordPress sites using the Search & Filter Pro plugin. This can lead to leakage of sensitive information such as user data, configuration details, or other confidential metadata stored within posts. While the vulnerability does not allow modification or deletion of data, the exposure of sensitive metadata can facilitate further attacks like social engineering, targeted phishing, or reconnaissance for privilege escalation. Organizations relying on WordPress for content management, e-commerce, or customer engagement may face reputational damage and compliance risks if sensitive data is exposed. Since the exploit requires authenticated access at Subscriber level or above, attackers would need to compromise or register low-privilege accounts first, which is often feasible on sites allowing user registrations. The vulnerability does not affect system availability or integrity, limiting its impact to confidentiality breaches. However, the widespread use of WordPress and this plugin means a large number of sites could be affected globally, increasing the risk surface for data leakage incidents.

Mitigation Recommendations

To mitigate CVE-2025-1528, organizations should first check if an updated version of the Search & Filter Pro plugin is available that addresses the missing authorization check and apply it promptly. If no patch is available, administrators should consider temporarily disabling the plugin or restricting its use to trusted users only. Implementing strict user registration controls and monitoring for suspicious subscriber account activity can reduce the risk of exploitation. Additionally, site owners can use web application firewalls (WAFs) to detect and block unauthorized attempts to access the vulnerable function. Reviewing and minimizing the amount of sensitive data stored in post meta fields can reduce potential exposure. Developers maintaining custom code interacting with this plugin should add explicit capability checks around calls to 'get_meta_values'. Regular security audits and penetration testing focusing on plugin vulnerabilities are recommended to identify and remediate similar authorization issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-20T23:18:57.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b15b7ef31ef0b54dedc

Added to database: 2/25/2026, 9:35:17 PM

Last enriched: 2/25/2026, 10:02:48 PM

Last updated: 2/26/2026, 8:03:14 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats