CVE-2025-47556: CWE-862 Missing Authorization in QuanticaLabs CSS3 Compare Pricing Tables for WordPress
Missing Authorization vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.5.
AI Analysis
Technical Summary
CVE-2025-47556 is a Missing Authorization vulnerability (CWE-862) identified in the QuanticaLabs CSS3 Compare Pricing Tables plugin for WordPress. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges to perform actions or access resources they should not be authorized to. The affected product is the CSS3 Compare Pricing Tables plugin, with versions up to 11.5 impacted, although specific version details are not fully enumerated. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L. This means the attack can be launched remotely over the network, requires low attack complexity, and requires the attacker to have some privileges (PR:L), but no user interaction is needed. The impact affects integrity and availability but not confidentiality. Specifically, an attacker with limited privileges can exploit the missing authorization to modify or disrupt pricing table data or functionality, potentially leading to incorrect pricing displays or denial of service conditions. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability was published on May 16, 2025, and is recognized by CISA, indicating its relevance in cybersecurity advisories. The root cause is an access control misconfiguration, a common issue in web applications and plugins that handle user roles and permissions improperly.
Potential Impact
For European organizations using WordPress websites with the QuanticaLabs CSS3 Compare Pricing Tables plugin, this vulnerability could lead to unauthorized modification or disruption of pricing information displayed to customers. This can damage business reputation, cause financial discrepancies, and potentially lead to loss of customer trust. E-commerce platforms or service providers relying on accurate pricing tables are particularly at risk. The integrity of displayed data is compromised, which may affect decision-making by customers and internal stakeholders. Availability impacts could manifest as denial of service or malfunctioning pricing tables, degrading user experience. Although confidentiality is not directly impacted, the indirect effects on business operations and customer perception can be significant. Given the widespread use of WordPress in Europe and the popularity of pricing table plugins for marketing and sales, the vulnerability poses a moderate risk. However, exploitation requires some level of authenticated access, which somewhat limits the attack surface to insiders or compromised accounts.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the QuanticaLabs CSS3 Compare Pricing Tables plugin. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only and review user roles to minimize privilege exposure. 2) Implement strict access control policies at the WordPress level, ensuring that only authorized users can modify pricing tables or related plugin settings. 3) Monitor logs for unusual activity related to the plugin, such as unauthorized changes or access attempts. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. 5) Consider temporarily disabling or removing the plugin if it is not critical to business operations until a patch is available. 6) Keep WordPress core and all plugins updated to the latest versions to reduce the risk of chained vulnerabilities. 7) Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to prevent account compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-47556: CWE-862 Missing Authorization in QuanticaLabs CSS3 Compare Pricing Tables for WordPress
Description
Missing Authorization vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-47556 is a Missing Authorization vulnerability (CWE-862) identified in the QuanticaLabs CSS3 Compare Pricing Tables plugin for WordPress. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges to perform actions or access resources they should not be authorized to. The affected product is the CSS3 Compare Pricing Tables plugin, with versions up to 11.5 impacted, although specific version details are not fully enumerated. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L. This means the attack can be launched remotely over the network, requires low attack complexity, and requires the attacker to have some privileges (PR:L), but no user interaction is needed. The impact affects integrity and availability but not confidentiality. Specifically, an attacker with limited privileges can exploit the missing authorization to modify or disrupt pricing table data or functionality, potentially leading to incorrect pricing displays or denial of service conditions. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability was published on May 16, 2025, and is recognized by CISA, indicating its relevance in cybersecurity advisories. The root cause is an access control misconfiguration, a common issue in web applications and plugins that handle user roles and permissions improperly.
Potential Impact
For European organizations using WordPress websites with the QuanticaLabs CSS3 Compare Pricing Tables plugin, this vulnerability could lead to unauthorized modification or disruption of pricing information displayed to customers. This can damage business reputation, cause financial discrepancies, and potentially lead to loss of customer trust. E-commerce platforms or service providers relying on accurate pricing tables are particularly at risk. The integrity of displayed data is compromised, which may affect decision-making by customers and internal stakeholders. Availability impacts could manifest as denial of service or malfunctioning pricing tables, degrading user experience. Although confidentiality is not directly impacted, the indirect effects on business operations and customer perception can be significant. Given the widespread use of WordPress in Europe and the popularity of pricing table plugins for marketing and sales, the vulnerability poses a moderate risk. However, exploitation requires some level of authenticated access, which somewhat limits the attack surface to insiders or compromised accounts.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the QuanticaLabs CSS3 Compare Pricing Tables plugin. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only and review user roles to minimize privilege exposure. 2) Implement strict access control policies at the WordPress level, ensuring that only authorized users can modify pricing tables or related plugin settings. 3) Monitor logs for unusual activity related to the plugin, such as unauthorized changes or access attempts. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. 5) Consider temporarily disabling or removing the plugin if it is not critical to business operations until a patch is available. 6) Keep WordPress core and all plugins updated to the latest versions to reduce the risk of chained vulnerabilities. 7) Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to prevent account compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:40:00.791Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebca4
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 10:02:29 PM
Last updated: 8/15/2025, 5:58:58 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.