Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode

0
Medium
VulnerabilityCVE-2025-3949cvecve-2025-3949cwe-862
Published: Fri May 09 2025 (05/09/2025, 08:24:05 UTC)
Source: CVE
Vendor/Project: seedprod
Product: Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode

Description

The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:05:00 UTC

Technical Analysis

CVE-2025-3949 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress. The issue exists in all versions up to and including 6.18.15 due to the absence of a proper capability check in the 'seedprod_lite_get_revisisons' function. This function is responsible for retrieving landing page revision data. Because the plugin fails to verify whether the requesting user has the appropriate permissions, any authenticated user with at least Subscriber-level access can exploit this flaw to read the content of arbitrary landing page revisions. These revisions may contain sensitive or confidential information that site administrators intended to keep restricted. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and privileges required are low (PR:L), making it relatively easy for an attacker with minimal access to leverage this flaw. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability. No known public exploits have been reported yet, and no patches were linked at the time of publication, indicating that mitigation may require vendor updates or manual access control adjustments. The plugin is widely used in WordPress sites for building landing pages, themes, and maintenance pages, making the scope of affected systems potentially large.

Potential Impact

The primary impact of CVE-2025-3949 is unauthorized disclosure of sensitive data contained in landing page revisions. Attackers with subscriber-level access can access historical content that may include proprietary marketing material, unpublished content, or other confidential information. While the vulnerability does not allow modification or deletion of data, the confidentiality breach can lead to information leakage, reputational damage, and potential competitive disadvantage. Organizations relying on SeedProd for their WordPress sites, especially those handling sensitive or regulated data, face increased risk of data exposure. Since the exploit requires only low-level authenticated access, attackers could leverage compromised or weak subscriber accounts to escalate data exposure. The vulnerability does not affect site availability or integrity, so operational disruption is unlikely. However, the ease of exploitation and the widespread use of WordPress and SeedProd plugins globally increase the risk profile for many organizations, particularly those in sectors where landing page content is sensitive or proprietary.

Mitigation Recommendations

1. Immediately restrict Subscriber-level user privileges to the minimum necessary and audit existing accounts for suspicious activity. 2. Monitor and log access to landing page revisions to detect unusual access patterns. 3. Apply vendor patches promptly once released to address the missing authorization check. 4. If patches are not yet available, implement temporary access controls such as disabling the plugin or restricting access to the 'seedprod_lite_get_revisisons' function via custom code or web application firewall (WAF) rules. 5. Educate site administrators and users about the risk of unauthorized data access through low-privileged accounts and enforce strong authentication policies. 6. Regularly review plugin permissions and update WordPress and plugins to the latest versions to reduce exposure to similar vulnerabilities. 7. Consider isolating sensitive landing page content or using alternative plugins with stricter access controls until the vulnerability is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-25T16:14:05.736Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd789a

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 2/27/2026, 2:05:00 PM

Last updated: 3/21/2026, 8:52:18 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses