Skip to main content

CVE-2025-3949: CWE-862 Missing Authorization in seedprod Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode

Medium
VulnerabilityCVE-2025-3949cvecve-2025-3949cwe-862
Published: Fri May 09 2025 (05/09/2025, 08:24:05 UTC)
Source: CVE
Vendor/Project: seedprod
Product: Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode

Description

The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:58:01 UTC

Technical Analysis

CVE-2025-3949 is a medium-severity vulnerability affecting the WordPress plugin 'Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode' in all versions up to and including 6.18.15. The vulnerability arises from a missing authorization check (CWE-862) in the function 'seedprod_lite_get_revisisons'. This function is responsible for retrieving landing page revision content. Due to the lack of proper capability verification, any authenticated user with Subscriber-level access or higher can exploit this flaw to read the content of arbitrary landing page revisions. This unauthorized data access does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The vulnerability has a CVSS v3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity and no user interaction required. The impact is limited to confidentiality, as the attacker can read sensitive content from landing page revisions but cannot modify data or disrupt availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is significant because landing page revisions may contain sensitive marketing content, unpublished data, or other proprietary information that organizations may not want exposed to low-privilege users. Given the widespread use of WordPress and the popularity of SeedProd's plugin for website and landing page creation, this vulnerability could be leveraged in multi-user environments where users have Subscriber-level accounts, such as membership sites or collaborative content management setups.

Potential Impact

For European organizations, the unauthorized disclosure of landing page revision content could lead to exposure of sensitive marketing strategies, unpublished promotional campaigns, or confidential client information embedded in page drafts. This could result in reputational damage, loss of competitive advantage, or inadvertent leakage of personal data if such data is included in the revisions. Organizations in sectors like e-commerce, media, and digital marketing agencies that rely heavily on WordPress and SeedProd plugins are particularly at risk. Although the vulnerability does not allow data modification or service disruption, the breach of confidentiality could violate GDPR requirements if personal data is exposed, potentially leading to regulatory penalties. The medium severity rating reflects the limited scope of impact but acknowledges the risk posed by unauthorized data access in environments with multiple authenticated users.

Mitigation Recommendations

1. Immediate mitigation involves restricting Subscriber-level accounts to trusted users only, minimizing the risk of exploitation from untrusted or external users. 2. Administrators should monitor user roles and permissions carefully, ensuring that only necessary users have authenticated access. 3. Until an official patch is released, consider temporarily disabling the SeedProd plugin or limiting its usage to essential personnel. 4. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the 'seedprod_lite_get_revisisons' function or related endpoints. 5. Conduct regular audits of landing page revision content to identify any unauthorized access or data leakage. 6. Stay updated with vendor advisories and apply patches promptly once available. 7. For organizations with custom WordPress deployments, consider applying custom code patches that enforce capability checks on the vulnerable function as an interim fix. 8. Educate users about the importance of strong authentication and monitoring for unusual access patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-25T16:14:05.736Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd789a

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:58:01 AM

Last updated: 7/26/2025, 10:56:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats