Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15507: CWE-862 Missing Authorization in magicimport Magic Import Document Extractor

0
Medium
VulnerabilityCVE-2025-15507cvecve-2025-15507cwe-862
Published: Wed Feb 04 2026 (02/04/2026, 08:25:30 UTC)
Source: CVE Database V5
Vendor/Project: magicimport
Product: Magic Import Document Extractor

Description

The Magic Import Document Extractor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_sync_usage() function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to modify the plugin's license status and credit balance.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:01:57 UTC

Technical Analysis

CVE-2025-15507 identifies a missing authorization vulnerability (CWE-862) in the Magic Import Document Extractor plugin for WordPress, specifically in the ajax_sync_usage() function. This function lacks a capability check, allowing unauthenticated remote attackers to modify sensitive plugin data, including license status and credit balances. The vulnerability affects all versions up to and including 1.0.4. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as attackers can alter license and credit information but cannot access confidential data or disrupt service availability. No patches have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could be exploited by automated scripts targeting vulnerable WordPress sites, potentially leading to unauthorized license usage or financial fraud related to plugin credits. The absence of authentication checks on AJAX endpoints is a common security oversight in WordPress plugins, emphasizing the need for robust capability verification in all exposed functions.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of license and credit data within the Magic Import Document Extractor plugin. Unauthorized modification could lead to financial losses due to fraudulent license status changes or credit manipulations. Organizations relying on this plugin for document extraction may face compliance risks if license terms are violated unknowingly. While confidentiality and availability are not directly impacted, the integrity compromise could undermine trust in software asset management and billing processes. Additionally, exploitation could serve as a foothold for further attacks if attackers leverage the altered license status to gain additional privileges or bypass restrictions. The risk is heightened for organizations with automated workflows dependent on accurate license and credit data. Given the widespread use of WordPress in Europe, especially among SMEs and content-heavy websites, the potential attack surface is significant.

Mitigation Recommendations

1. Monitor official vendor channels for patches addressing CVE-2025-15507 and apply them promptly once available. 2. Until patches are released, restrict access to the ajax_sync_usage() AJAX endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests targeting this function. 3. Harden WordPress installations by enforcing strict user role and capability management, ensuring that only authorized users can invoke sensitive plugin functions. 4. Conduct regular audits of plugin license and credit data to detect unauthorized changes early. 5. Employ intrusion detection systems (IDS) and log analysis to identify anomalous AJAX requests indicative of exploitation attempts. 6. Consider disabling or replacing the Magic Import Document Extractor plugin if it is not critical to operations or if a secure alternative exists. 7. Educate site administrators about the risks of installing plugins without proper security reviews and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-11T11:18:03.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69830729f9fa50a62f79eb72

Added to database: 2/4/2026, 8:45:29 AM

Last enriched: 2/4/2026, 9:01:57 AM

Last updated: 2/6/2026, 11:15:45 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats