CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode
The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.
AI Analysis
Technical Summary
CVE-2025-3949 is a medium-severity vulnerability affecting the WordPress plugin 'Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode' in all versions up to and including 6.18.15. The vulnerability arises from a missing authorization check (CWE-862) in the function 'seedprod_lite_get_revisisons'. This function is responsible for retrieving landing page revision content. Due to the lack of proper capability verification, any authenticated user with Subscriber-level access or higher can exploit this flaw to read the content of arbitrary landing page revisions. This unauthorized data access does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The vulnerability has a CVSS v3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity and no user interaction required. The impact is limited to confidentiality, as the attacker can read sensitive content from landing page revisions but cannot modify data or disrupt availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is significant because landing page revisions may contain sensitive marketing content, unpublished data, or other proprietary information that organizations may not want exposed to low-privilege users. Given the widespread use of WordPress and the popularity of SeedProd's plugin for website and landing page creation, this vulnerability could be leveraged in multi-user environments where users have Subscriber-level accounts, such as membership sites or collaborative content management setups.
Potential Impact
For European organizations, the unauthorized disclosure of landing page revision content could lead to exposure of sensitive marketing strategies, unpublished promotional campaigns, or confidential client information embedded in page drafts. This could result in reputational damage, loss of competitive advantage, or inadvertent leakage of personal data if such data is included in the revisions. Organizations in sectors like e-commerce, media, and digital marketing agencies that rely heavily on WordPress and SeedProd plugins are particularly at risk. Although the vulnerability does not allow data modification or service disruption, the breach of confidentiality could violate GDPR requirements if personal data is exposed, potentially leading to regulatory penalties. The medium severity rating reflects the limited scope of impact but acknowledges the risk posed by unauthorized data access in environments with multiple authenticated users.
Mitigation Recommendations
1. Immediate mitigation involves restricting Subscriber-level accounts to trusted users only, minimizing the risk of exploitation from untrusted or external users. 2. Administrators should monitor user roles and permissions carefully, ensuring that only necessary users have authenticated access. 3. Until an official patch is released, consider temporarily disabling the SeedProd plugin or limiting its usage to essential personnel. 4. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'seedprod_lite_get_revisisons' function or related endpoints. 5. Conduct regular audits of landing page revision content to identify any unauthorized access or data leakage. 6. Stay updated with vendor advisories and apply patches promptly once available. 7. For organizations with custom WordPress deployments, consider applying custom code patches that enforce capability checks on the vulnerable function as an interim fix. 8. Educate users about the importance of strong authentication and monitoring for unusual access patterns.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode
Description
The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.
AI-Powered Analysis
Technical Analysis
CVE-2025-3949 is a medium-severity vulnerability affecting the WordPress plugin 'Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode' in all versions up to and including 6.18.15. The vulnerability arises from a missing authorization check (CWE-862) in the function 'seedprod_lite_get_revisisons'. This function is responsible for retrieving landing page revision content. Due to the lack of proper capability verification, any authenticated user with Subscriber-level access or higher can exploit this flaw to read the content of arbitrary landing page revisions. This unauthorized data access does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The vulnerability has a CVSS v3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity and no user interaction required. The impact is limited to confidentiality, as the attacker can read sensitive content from landing page revisions but cannot modify data or disrupt availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is significant because landing page revisions may contain sensitive marketing content, unpublished data, or other proprietary information that organizations may not want exposed to low-privilege users. Given the widespread use of WordPress and the popularity of SeedProd's plugin for website and landing page creation, this vulnerability could be leveraged in multi-user environments where users have Subscriber-level accounts, such as membership sites or collaborative content management setups.
Potential Impact
For European organizations, the unauthorized disclosure of landing page revision content could lead to exposure of sensitive marketing strategies, unpublished promotional campaigns, or confidential client information embedded in page drafts. This could result in reputational damage, loss of competitive advantage, or inadvertent leakage of personal data if such data is included in the revisions. Organizations in sectors like e-commerce, media, and digital marketing agencies that rely heavily on WordPress and SeedProd plugins are particularly at risk. Although the vulnerability does not allow data modification or service disruption, the breach of confidentiality could violate GDPR requirements if personal data is exposed, potentially leading to regulatory penalties. The medium severity rating reflects the limited scope of impact but acknowledges the risk posed by unauthorized data access in environments with multiple authenticated users.
Mitigation Recommendations
1. Immediate mitigation involves restricting Subscriber-level accounts to trusted users only, minimizing the risk of exploitation from untrusted or external users. 2. Administrators should monitor user roles and permissions carefully, ensuring that only necessary users have authenticated access. 3. Until an official patch is released, consider temporarily disabling the SeedProd plugin or limiting its usage to essential personnel. 4. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'seedprod_lite_get_revisisons' function or related endpoints. 5. Conduct regular audits of landing page revision content to identify any unauthorized access or data leakage. 6. Stay updated with vendor advisories and apply patches promptly once available. 7. For organizations with custom WordPress deployments, consider applying custom code patches that enforce capability checks on the vulnerable function as an interim fix. 8. Educate users about the importance of strong authentication and monitoring for unusual access patterns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-25T16:14:05.736Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd789a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:58:01 AM
Last updated: 7/26/2025, 10:56:00 AM
Views: 11
Related Threats
CVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.