Skip to main content

CVE-2025-47556: CWE-862 Missing Authorization in QuanticaLabs CSS3 Compare Pricing Tables for WordPress

Low
VulnerabilityCVE-2025-47556cvecve-2025-47556cwe-862
Published: Fri May 16 2025 (05/16/2025, 15:45:21 UTC)
Source: CVE
Vendor/Project: QuanticaLabs
Product: CSS3 Compare Pricing Tables for WordPress

Description

Missing Authorization vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.5.

AI-Powered Analysis

AILast updated: 07/11/2025, 22:02:29 UTC

Technical Analysis

CVE-2025-47556 is a Missing Authorization vulnerability (CWE-862) identified in the QuanticaLabs CSS3 Compare Pricing Tables plugin for WordPress. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges to perform actions or access resources they should not be authorized to. The affected product is the CSS3 Compare Pricing Tables plugin, with versions up to 11.5 impacted, although specific version details are not fully enumerated. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L. This means the attack can be launched remotely over the network, requires low attack complexity, and requires the attacker to have some privileges (PR:L), but no user interaction is needed. The impact affects integrity and availability but not confidentiality. Specifically, an attacker with limited privileges can exploit the missing authorization to modify or disrupt pricing table data or functionality, potentially leading to incorrect pricing displays or denial of service conditions. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability was published on May 16, 2025, and is recognized by CISA, indicating its relevance in cybersecurity advisories. The root cause is an access control misconfiguration, a common issue in web applications and plugins that handle user roles and permissions improperly.

Potential Impact

For European organizations using WordPress websites with the QuanticaLabs CSS3 Compare Pricing Tables plugin, this vulnerability could lead to unauthorized modification or disruption of pricing information displayed to customers. This can damage business reputation, cause financial discrepancies, and potentially lead to loss of customer trust. E-commerce platforms or service providers relying on accurate pricing tables are particularly at risk. The integrity of displayed data is compromised, which may affect decision-making by customers and internal stakeholders. Availability impacts could manifest as denial of service or malfunctioning pricing tables, degrading user experience. Although confidentiality is not directly impacted, the indirect effects on business operations and customer perception can be significant. Given the widespread use of WordPress in Europe and the popularity of pricing table plugins for marketing and sales, the vulnerability poses a moderate risk. However, exploitation requires some level of authenticated access, which somewhat limits the attack surface to insiders or compromised accounts.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the QuanticaLabs CSS3 Compare Pricing Tables plugin. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict plugin usage to trusted administrators only and review user roles to minimize privilege exposure. 2) Implement strict access control policies at the WordPress level, ensuring that only authorized users can modify pricing tables or related plugin settings. 3) Monitor logs for unusual activity related to the plugin, such as unauthorized changes or access attempts. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. 5) Consider temporarily disabling or removing the plugin if it is not critical to business operations until a patch is available. 6) Keep WordPress core and all plugins updated to the latest versions to reduce the risk of chained vulnerabilities. 7) Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to prevent account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:40:00.791Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebca4

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 10:02:29 PM

Last updated: 8/15/2025, 5:58:58 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats