Skip to main content

CVE-2025-49991: CWE-862 Missing Authorization in tggfref WP-Recall

Medium
VulnerabilityCVE-2025-49991cvecve-2025-49991cwe-862
Published: Fri Jun 20 2025 (06/20/2025, 15:04:07 UTC)
Source: CVE Database V5
Vendor/Project: tggfref
Product: WP-Recall

Description

Missing Authorization vulnerability in tggfref WP-Recall allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WP-Recall: from n/a through 16.26.14.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:07:29 UTC

Technical Analysis

CVE-2025-49991 is a security vulnerability classified under CWE-862, indicating a Missing Authorization issue in the tggfref WP-Recall plugin. This vulnerability arises because certain functionalities within WP-Recall are not properly constrained by Access Control Lists (ACLs), allowing unauthorized users to access features or operations that should be restricted. The affected product is WP-Recall, a plugin presumably used within WordPress environments, with versions up to 16.26.14 impacted. The vulnerability does not require any user interaction, privileges, or authentication to exploit, and it can be triggered remotely over the network (AV:N, AC:L, PR:N, UI:N). The CVSS v3.1 base score is 5.3, indicating a medium severity level. The impact is limited to availability (A:L) with no direct impact on confidentiality or integrity. This suggests that exploitation may cause denial of service or disruption of service functionality but does not allow data leakage or unauthorized data modification. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published recently on June 20, 2025, and was reserved on June 11, 2025. The absence of proper authorization checks means that attackers can invoke sensitive functions without proper permissions, potentially leading to service interruptions or degraded functionality within affected WordPress sites using WP-Recall. Given the nature of WordPress plugins, this vulnerability could be leveraged to disrupt websites relying on WP-Recall for critical features, impacting availability and user experience.

Potential Impact

For European organizations, the impact of CVE-2025-49991 primarily concerns service availability and operational continuity of websites or web applications utilizing the WP-Recall plugin. Organizations relying on WP-Recall for customer engagement, content management, or other interactive features may experience service disruptions if exploited. Although confidentiality and integrity are not directly compromised, availability issues can lead to reputational damage, loss of customer trust, and potential financial losses, especially for e-commerce or service-oriented platforms. The medium severity rating reflects that while the vulnerability does not enable data breaches, the ability for unauthenticated attackers to disrupt services remotely poses a tangible risk. European organizations with high web traffic or critical online services using WP-Recall could face downtime or degraded performance, affecting business operations. Additionally, regulatory frameworks such as GDPR emphasize service availability as part of data protection obligations, so prolonged disruptions might attract regulatory scrutiny. The lack of known exploits currently reduces immediate risk, but the window before patches are available necessitates proactive mitigation.

Mitigation Recommendations

1. Immediate mitigation should involve disabling or uninstalling the WP-Recall plugin until a security patch is released by the vendor. 2. If WP-Recall functionality is essential, restrict access to the affected plugin's endpoints via web application firewalls (WAFs) or reverse proxies by implementing IP whitelisting or geo-blocking to limit exposure. 3. Monitor web server logs and application logs for unusual or unauthorized access attempts targeting WP-Recall functionalities. 4. Employ network-level controls to limit external access to administrative or plugin-specific URLs, reducing the attack surface. 5. Engage with the vendor or community to obtain timely updates or patches and apply them promptly once available. 6. Conduct internal audits of WordPress installations to inventory plugin versions and identify all instances of WP-Recall to ensure comprehensive coverage. 7. Consider implementing rate limiting on requests to WP-Recall endpoints to mitigate potential denial-of-service attempts. 8. Educate web administrators about this vulnerability and encourage vigilance for suspicious activity. These steps go beyond generic advice by focusing on access restriction, monitoring, and proactive plugin management tailored to the specific vulnerability characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:56.073Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e84aded773421b5aa17

Added to database: 6/21/2025, 10:50:44 AM

Last enriched: 6/21/2025, 12:07:29 PM

Last updated: 8/3/2025, 6:30:03 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats