Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4654: CWE-285 Improper Authorization in soumettre Soumettre.fr

0
Low
VulnerabilityCVE-2025-4654cvecve-2025-4654cwe-285
Published: Wed Jul 02 2025 (07/02/2025, 03:47:24 UTC)
Source: CVE Database V5
Vendor/Project: soumettre
Product: Soumettre.fr

Description

The Soumettre.fr plugin for WordPress is vulnerable to unauthorized access and modification of data due to a improper authorization checks on the make_signature function in all versions up to, and including, 2.1.5. This makes it possible for unauthenticated attackers to create/edit/delete Soumettre posts. This vulnerability affects only installations where the soumettre account is not connected (i.e. API key is not installed)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:45:35 UTC

Technical Analysis

CVE-2025-4654 identifies an improper authorization vulnerability (CWE-285) in the Soumettre.fr WordPress plugin, specifically in the make_signature function. This flaw exists in all versions up to and including 2.1.5 and allows unauthenticated attackers to bypass authorization controls when the soumettre account is not connected via an API key. The vulnerability enables attackers to create, edit, or delete posts managed by the Soumettre plugin, potentially leading to unauthorized content manipulation. The root cause is the lack of proper authorization checks before executing sensitive functions. The CVSS 3.1 base score is 3.7 (low), reflecting no impact on confidentiality or availability, limited impact on integrity, no privileges required, no user interaction, but high attack complexity. No known exploits have been reported in the wild, and no official patches have been published yet. This vulnerability affects only installations where the soumettre account is disconnected, which reduces the attack surface. The plugin is primarily used on WordPress sites, often in French-speaking regions. The vulnerability could be leveraged to deface or manipulate content, potentially damaging site reputation or misleading users. However, the absence of confidentiality or availability impact limits the overall risk severity.

Potential Impact

The primary impact of CVE-2025-4654 is unauthorized modification of website content managed by the Soumettre.fr plugin, which can undermine data integrity. Attackers can create, edit, or delete posts without authentication, potentially leading to misinformation, defacement, or loss of trust in affected websites. Since confidentiality and availability are not impacted, sensitive data exposure or denial of service are not concerns here. The vulnerability could be exploited to spread misinformation or malicious content, damaging brand reputation and user trust. Organizations relying on Soumettre.fr for content submission workflows may face operational disruptions or reputational harm if attackers manipulate posts. However, the requirement that the soumettre account be disconnected limits the scope, as properly configured installations with API keys are not vulnerable. The lack of known exploits and the high attack complexity further reduce immediate risk. Nonetheless, organizations should treat this as a data integrity risk that could affect public-facing content and user perception.

Mitigation Recommendations

To mitigate CVE-2025-4654, organizations should immediately verify whether their Soumettre.fr plugin installations have the soumettre account connected via an API key. Connecting the account properly enforces authorization checks and prevents exploitation. If the API key connection is not feasible, disabling or uninstalling the Soumettre.fr plugin until a vendor patch is released is recommended. Monitoring website content for unauthorized changes can help detect exploitation attempts early. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the make_signature function may provide temporary protection. Organizations should subscribe to vendor advisories and update the plugin promptly once a security patch becomes available. Additionally, restricting administrative access and hardening WordPress security overall can reduce the risk of exploitation. Regular backups of website content will aid recovery if unauthorized modifications occur.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-13T13:51:31.166Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6864b0fa6f40f0eb7291717c

Added to database: 7/2/2025, 4:09:30 AM

Last enriched: 2/27/2026, 2:45:35 PM

Last updated: 3/24/2026, 9:42:00 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses