CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode
The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.
AI Analysis
Technical Summary
CVE-2025-3949 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress. The issue exists in all versions up to and including 6.18.15 due to the absence of a proper capability check in the 'seedprod_lite_get_revisisons' function. This function is responsible for retrieving landing page revision data. Because the plugin fails to verify whether the requesting user has the appropriate permissions, any authenticated user with at least Subscriber-level access can exploit this flaw to read the content of arbitrary landing page revisions. These revisions may contain sensitive or confidential information that site administrators intended to keep restricted. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and privileges required are low (PR:L), making it relatively easy for an attacker with minimal access to leverage this flaw. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability. No known public exploits have been reported yet, and no patches were linked at the time of publication, indicating that mitigation may require vendor updates or manual access control adjustments. The plugin is widely used in WordPress sites for building landing pages, themes, and maintenance pages, making the scope of affected systems potentially large.
Potential Impact
The primary impact of CVE-2025-3949 is unauthorized disclosure of sensitive data contained in landing page revisions. Attackers with subscriber-level access can access historical content that may include proprietary marketing material, unpublished content, or other confidential information. While the vulnerability does not allow modification or deletion of data, the confidentiality breach can lead to information leakage, reputational damage, and potential competitive disadvantage. Organizations relying on SeedProd for their WordPress sites, especially those handling sensitive or regulated data, face increased risk of data exposure. Since the exploit requires only low-level authenticated access, attackers could leverage compromised or weak subscriber accounts to escalate data exposure. The vulnerability does not affect site availability or integrity, so operational disruption is unlikely. However, the ease of exploitation and the widespread use of WordPress and SeedProd plugins globally increase the risk profile for many organizations, particularly those in sectors where landing page content is sensitive or proprietary.
Mitigation Recommendations
1. Immediately restrict Subscriber-level user privileges to the minimum necessary and audit existing accounts for suspicious activity. 2. Monitor and log access to landing page revisions to detect unusual access patterns. 3. Apply vendor patches promptly once released to address the missing authorization check. 4. If patches are not yet available, implement temporary access controls such as disabling the plugin or restricting access to the 'seedprod_lite_get_revisisons' function via custom code or web application firewall (WAF) rules. 5. Educate site administrators and users about the risk of unauthorized data access through low-privileged accounts and enforce strong authentication policies. 6. Regularly review plugin permissions and update WordPress and plugins to the latest versions to reduce exposure to similar vulnerabilities. 7. Consider isolating sensitive landing page content or using alternative plugins with stricter access controls until the vulnerability is resolved.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, India, France, Netherlands, Brazil, Japan
CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode
Description
The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-3949 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress. The issue exists in all versions up to and including 6.18.15 due to the absence of a proper capability check in the 'seedprod_lite_get_revisisons' function. This function is responsible for retrieving landing page revision data. Because the plugin fails to verify whether the requesting user has the appropriate permissions, any authenticated user with at least Subscriber-level access can exploit this flaw to read the content of arbitrary landing page revisions. These revisions may contain sensitive or confidential information that site administrators intended to keep restricted. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and privileges required are low (PR:L), making it relatively easy for an attacker with minimal access to leverage this flaw. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability. No known public exploits have been reported yet, and no patches were linked at the time of publication, indicating that mitigation may require vendor updates or manual access control adjustments. The plugin is widely used in WordPress sites for building landing pages, themes, and maintenance pages, making the scope of affected systems potentially large.
Potential Impact
The primary impact of CVE-2025-3949 is unauthorized disclosure of sensitive data contained in landing page revisions. Attackers with subscriber-level access can access historical content that may include proprietary marketing material, unpublished content, or other confidential information. While the vulnerability does not allow modification or deletion of data, the confidentiality breach can lead to information leakage, reputational damage, and potential competitive disadvantage. Organizations relying on SeedProd for their WordPress sites, especially those handling sensitive or regulated data, face increased risk of data exposure. Since the exploit requires only low-level authenticated access, attackers could leverage compromised or weak subscriber accounts to escalate data exposure. The vulnerability does not affect site availability or integrity, so operational disruption is unlikely. However, the ease of exploitation and the widespread use of WordPress and SeedProd plugins globally increase the risk profile for many organizations, particularly those in sectors where landing page content is sensitive or proprietary.
Mitigation Recommendations
1. Immediately restrict Subscriber-level user privileges to the minimum necessary and audit existing accounts for suspicious activity. 2. Monitor and log access to landing page revisions to detect unusual access patterns. 3. Apply vendor patches promptly once released to address the missing authorization check. 4. If patches are not yet available, implement temporary access controls such as disabling the plugin or restricting access to the 'seedprod_lite_get_revisisons' function via custom code or web application firewall (WAF) rules. 5. Educate site administrators and users about the risk of unauthorized data access through low-privileged accounts and enforce strong authentication policies. 6. Regularly review plugin permissions and update WordPress and plugins to the latest versions to reduce exposure to similar vulnerabilities. 7. Consider isolating sensitive landing page content or using alternative plugins with stricter access controls until the vulnerability is resolved.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-25T16:14:05.736Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd789a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 2/27/2026, 2:05:00 PM
Last updated: 3/21/2026, 8:52:18 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.