Skip to main content

CVE-2025-4672: CWE-285 Improper Authorization in offsprout Offsprout Page Builder

High
VulnerabilityCVE-2025-4672cvecve-2025-4672cwe-285
Published: Sat May 31 2025 (05/31/2025, 06:40:55 UTC)
Source: CVE Database V5
Vendor/Project: offsprout
Product: Offsprout Page Builder

Description

The Offsprout Page Builder plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization placed on the permission_callback() function in versions 2.2.1 to 2.15.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to read, create, update or delete any user meta, including flipping their own wp_capabilities to administrator and fully escalate their privileges.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:25:24 UTC

Technical Analysis

CVE-2025-4672 is a high-severity vulnerability affecting the Offsprout Page Builder plugin for WordPress, specifically versions from 2.2.1 up to 2.15.2. The vulnerability arises from improper authorization checks implemented in the permission_callback() function. This flaw allows authenticated users with Contributor-level privileges or higher to perform unauthorized actions on user meta data. Exploiting this vulnerability, an attacker can read, create, update, or delete any user meta information, including the critical wp_capabilities field. By manipulating wp_capabilities, an attacker can escalate their privileges to administrator level, thereby gaining full control over the WordPress site. The vulnerability is classified under CWE-285 (Improper Authorization) and has a CVSS v3.1 base score of 8.8, indicating a high level of severity. The attack vector is network-based (remote), requires low attack complexity, and only requires privileges of a Contributor or above, with no user interaction needed. The impact on confidentiality, integrity, and availability is high, as an attacker can fully compromise the site, potentially leading to data breaches, defacement, or further lateral movement within the hosting environment. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be treated with urgency. No official patches are listed yet, which increases the risk window for affected users. This vulnerability highlights the critical need for proper authorization checks in WordPress plugins, especially those managing user roles and capabilities.

Potential Impact

For European organizations using WordPress sites with the Offsprout Page Builder plugin, this vulnerability poses a significant risk. An attacker with minimal privileges (Contributor or above) can escalate to administrator, potentially compromising the entire website and any connected systems. This can lead to unauthorized data access, defacement, injection of malicious content, or use of the compromised site as a launchpad for further attacks. Organizations relying on WordPress for e-commerce, customer portals, or internal communications could face severe confidentiality breaches and operational disruptions. Given the widespread use of WordPress across Europe, especially among SMEs and public sector entities, the impact could be broad. Additionally, GDPR compliance could be jeopardized if personal data is exposed or altered. The lack of a patch increases the urgency for mitigation to prevent exploitation. The vulnerability also undermines trust in affected organizations’ web presence and can lead to reputational damage and financial losses.

Mitigation Recommendations

1. Immediate mitigation should include restricting Contributor-level access and above to only trusted users until a patch is available. 2. Implement strict monitoring and logging of user role changes and user meta modifications to detect suspicious activity early. 3. Use Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the permission_callback() function or user meta endpoints. 4. Consider temporarily disabling or removing the Offsprout Page Builder plugin if it is not critical to operations. 5. Regularly audit user roles and capabilities to ensure no unauthorized privilege escalations have occurred. 6. Follow Offsprout’s official channels for patch releases and apply updates immediately once available. 7. Employ principle of least privilege in WordPress user management to minimize the number of users with Contributor or higher roles. 8. Educate administrators and developers about the risks of improper authorization and encourage secure coding practices for custom plugins or themes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-13T22:58:20.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683aa517182aa0cae2d47e2f

Added to database: 5/31/2025, 6:43:35 AM

Last enriched: 7/8/2025, 1:25:24 PM

Last updated: 8/6/2025, 8:47:39 AM

Views: 65

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats