Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46255: CWE-862 Missing Authorization in Marketing Fire LLC LoginWP - Pro

0
High
VulnerabilityCVE-2025-46255cvecve-2025-46255cwe-862
Published: Mon Jan 05 2026 (01/05/2026, 16:44:34 UTC)
Source: CVE Database V5
Vendor/Project: Marketing Fire LLC
Product: LoginWP - Pro

Description

Missing Authorization vulnerability in Marketing Fire LLC LoginWP - Pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects LoginWP - Pro: from n/a through 4.0.8.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:49:37 UTC

Technical Analysis

CVE-2025-46255 identifies a missing authorization vulnerability (CWE-862) in the LoginWP - Pro plugin developed by Marketing Fire LLC, affecting all versions up to 4.0.8.5. This vulnerability arises because certain plugin functionalities are not properly constrained by Access Control Lists (ACLs), allowing unauthenticated remote attackers to invoke sensitive functions without any privilege checks. The vulnerability is exploitable over the network without requiring authentication or user interaction, increasing its risk profile. While the vulnerability does not disclose sensitive information (no confidentiality impact), it allows unauthorized modification of data or plugin settings, thus compromising the integrity of affected systems. The lack of proper authorization checks means attackers can potentially manipulate login-related configurations or user session management features that LoginWP - Pro controls, which could lead to privilege escalation or bypass of intended access restrictions. No patches or exploit code are currently publicly available, but the vulnerability is officially published and assigned a CVSS v3.1 score of 7.5 (high severity), reflecting its ease of exploitation and significant impact on integrity. The vulnerability was reserved in April 2025 and published in January 2026. Organizations using LoginWP - Pro should be aware of this risk and prepare to apply vendor patches or mitigations once released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of their WordPress-based authentication and user management systems. Since LoginWP - Pro is a plugin that manages login and session functionalities, unauthorized access to its features could allow attackers to alter login workflows, potentially enabling unauthorized access or privilege escalation. This can lead to compromised user accounts, unauthorized administrative access, or disruption of authentication mechanisms. The absence of confidentiality impact reduces the risk of data leakage, but the integrity compromise can facilitate further attacks such as account takeover or persistent unauthorized access. Organizations in sectors with high reliance on WordPress for customer-facing portals, e-commerce, or internal authentication systems are particularly vulnerable. The ease of remote exploitation without authentication increases the likelihood of automated attacks targeting vulnerable installations. This can result in reputational damage, regulatory non-compliance (e.g., GDPR if user data is indirectly affected), and operational disruptions. The lack of known exploits in the wild currently offers a window for proactive defense, but the threat landscape may evolve rapidly once exploit code becomes available.

Mitigation Recommendations

1. Immediately audit all WordPress installations to identify the presence of LoginWP - Pro plugin and its version. 2. Restrict access to the plugin's administrative and functional endpoints using web application firewalls (WAFs) or reverse proxies to block unauthenticated requests targeting these functions. 3. Implement strict network segmentation and access controls to limit exposure of WordPress admin interfaces to trusted networks only. 4. Monitor logs and network traffic for unusual or unauthorized access attempts to LoginWP - Pro endpoints, focusing on unauthenticated requests invoking sensitive functions. 5. Engage with the vendor (Marketing Fire LLC) to obtain patches or updates addressing this vulnerability as soon as they are released. 6. Until patches are available, consider disabling or uninstalling the plugin if feasible, or applying temporary access restrictions via .htaccess or similar web server configurations. 7. Educate system administrators and security teams about this vulnerability to ensure rapid response to any suspicious activity. 8. Regularly update WordPress core and all plugins to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-22T09:21:51.395Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bec94b7d62031395509bb

Added to database: 1/5/2026, 4:53:40 PM

Last enriched: 1/20/2026, 7:49:37 PM

Last updated: 2/7/2026, 2:36:28 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats