Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3766: CWE-862 Missing Authorization in webfactory Login Lockdown & Protection

0
Medium
VulnerabilityCVE-2025-3766cvecve-2025-3766cwe-862
Published: Wed May 07 2025 (05/07/2025, 04:22:54 UTC)
Source: CVE
Vendor/Project: webfactory
Product: Login Lockdown & Protection

Description

The Login Lockdown & Protection plugin for WordPress is vulnerable to unauthorized nonce access due to a missing capability check on the ajax_run_tool function in all versions up to, and including, 2.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain a valid nonce that can be used to generate a global unlock key, which can in turn be used to add arbitrary IP address to the plugin allowlist. This can only by exploited on new installations where the site administrator hasn't visited the loginlockdown page yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:49:12 UTC

Technical Analysis

The vulnerability identified as CVE-2025-3766 affects the Login Lockdown & Protection WordPress plugin developed by webfactory, specifically versions up to 2.11. The root cause is a missing capability check in the ajax_run_tool function, which is responsible for handling AJAX requests related to the plugin's lockdown features. This missing authorization allows any authenticated user with at least Subscriber-level privileges to request and obtain a valid nonce. Normally, nonces are used to protect against CSRF attacks and ensure that actions are performed by authorized users. However, in this case, the nonce can be exploited to generate a global unlock key. This key can then be used to add arbitrary IP addresses to the plugin's allowlist, effectively bypassing the IP-based login restrictions that the plugin enforces. The vulnerability is exploitable only on new installations where the site administrator has not yet visited the loginlockdown page, which presumably initializes or restricts access controls. Because Subscriber-level users are typically low-privileged, this vulnerability escalates their ability to circumvent security controls without requiring administrator credentials. The attack vector is remote over the network, with low complexity and no user interaction needed beyond authentication. The vulnerability impacts confidentiality and integrity by allowing unauthorized access control modifications but does not affect availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network attack vector, low complexity, low privileges required, no user interaction, unchanged scope, low confidentiality and integrity impact, and no availability impact.

Potential Impact

This vulnerability allows low-privileged authenticated users to bypass IP-based login restrictions by adding arbitrary IP addresses to the allowlist. This can facilitate unauthorized access attempts, including brute force attacks from whitelisted IPs, potentially leading to credential compromise or unauthorized account access. Organizations relying on the Login Lockdown & Protection plugin to secure login endpoints may have a false sense of security, as the IP allowlist can be manipulated without administrator consent. The risk is particularly significant for sites with multiple low-privileged users or where Subscriber roles are assigned broadly. Although the vulnerability does not directly compromise availability, the integrity and confidentiality of the authentication process are undermined. Attackers could leverage this to escalate attacks or maintain persistent access. Since exploitation requires authenticated access, the threat is mitigated somewhat by existing access controls, but the ease of exploitation and the potential for privilege escalation make it a notable risk. The lack of known exploits in the wild reduces immediate urgency but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is widely known.

Mitigation Recommendations

Administrators should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit user roles to ensure no unnecessary accounts have access. It is critical to monitor and restrict access to the loginlockdown page, ensuring administrators visit this page promptly after installation to initialize proper controls. Until an official patch is released, consider disabling or uninstalling the Login Lockdown & Protection plugin on new installations or sites with multiple low-privileged users. Implement additional monitoring on IP allowlist changes and audit logs for suspicious activity. Employ network-level controls such as firewall rules and VPNs to limit login attempts from untrusted IP addresses. Consider using alternative plugins or security solutions with verified authorization checks. Stay updated with vendor advisories and apply patches immediately once available. For environments with high security requirements, consider implementing multi-factor authentication to reduce the risk of unauthorized access even if IP restrictions are bypassed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-17T13:28:21.186Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9be3

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/27/2026, 1:49:12 PM

Last updated: 3/24/2026, 5:42:17 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses