CVE-2025-60128: CWE-862 Missing Authorization in WP Delicious Delisho
Missing Authorization vulnerability in WP Delicious Delisho allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Delisho: from n/a through 1.1.3.
AI Analysis
Technical Summary
CVE-2025-60128 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'WP Delicious Delisho' up to version 1.1.3. This vulnerability arises from improperly configured access control mechanisms, allowing users with limited privileges (requiring at least some level of authentication) to perform actions or access resources that should be restricted. Specifically, the vulnerability does not require user interaction beyond authentication, and it can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 4.3, indicating a medium severity level, with the impact primarily on integrity (I:L) but no direct impact on confidentiality or availability. The vulnerability does not require high attack complexity (AC:L) and does not involve user interaction (UI:N). Although no known exploits are currently reported in the wild, the flaw could allow authenticated users to escalate privileges or manipulate data they should not be authorized to access, potentially leading to unauthorized modifications within the affected WordPress environment. The lack of a patch or mitigation link suggests that the vendor has not yet released an official fix, increasing the urgency for administrators to apply compensating controls or monitor for suspicious activity. The vulnerability affects the Delisho plugin, which is used for restaurant menu or food delivery-related functionalities on WordPress sites, making it relevant to websites in the hospitality and food service sectors.
Potential Impact
For European organizations, especially those operating in the hospitality, food delivery, or restaurant sectors using WordPress with the Delisho plugin, this vulnerability could lead to unauthorized modification of menu data, pricing, or order processing workflows. Such unauthorized changes could damage business reputation, cause financial loss, or disrupt customer experience. Although the confidentiality and availability impacts are minimal, integrity violations could undermine trust in online ordering systems. Furthermore, if attackers leverage this vulnerability as a foothold, it could be a stepping stone to broader compromise within the WordPress environment, potentially exposing other plugins or sensitive data. Given the widespread use of WordPress across Europe and the popularity of food service websites, the vulnerability poses a moderate risk, particularly to small and medium enterprises that may not have rigorous security monitoring or patch management processes.
Mitigation Recommendations
Since no official patch is currently available, European organizations should take immediate steps to mitigate risk. These include: 1) Restricting access to the WordPress admin and plugin management interfaces to trusted IP addresses or VPN users only; 2) Implementing strict role-based access controls within WordPress to ensure users have only the minimum necessary privileges; 3) Monitoring logs for unusual activity related to the Delisho plugin, such as unexpected changes to menu items or orders; 4) Temporarily disabling or uninstalling the Delisho plugin if it is not critical to business operations until a patch is released; 5) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints; 6) Keeping WordPress core and all other plugins updated to reduce the attack surface; and 7) Preparing incident response plans specific to WordPress plugin abuse scenarios. Organizations should also subscribe to vendor and security mailing lists to receive timely updates on patches or exploit disclosures.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-60128: CWE-862 Missing Authorization in WP Delicious Delisho
Description
Missing Authorization vulnerability in WP Delicious Delisho allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Delisho: from n/a through 1.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-60128 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'WP Delicious Delisho' up to version 1.1.3. This vulnerability arises from improperly configured access control mechanisms, allowing users with limited privileges (requiring at least some level of authentication) to perform actions or access resources that should be restricted. Specifically, the vulnerability does not require user interaction beyond authentication, and it can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 4.3, indicating a medium severity level, with the impact primarily on integrity (I:L) but no direct impact on confidentiality or availability. The vulnerability does not require high attack complexity (AC:L) and does not involve user interaction (UI:N). Although no known exploits are currently reported in the wild, the flaw could allow authenticated users to escalate privileges or manipulate data they should not be authorized to access, potentially leading to unauthorized modifications within the affected WordPress environment. The lack of a patch or mitigation link suggests that the vendor has not yet released an official fix, increasing the urgency for administrators to apply compensating controls or monitor for suspicious activity. The vulnerability affects the Delisho plugin, which is used for restaurant menu or food delivery-related functionalities on WordPress sites, making it relevant to websites in the hospitality and food service sectors.
Potential Impact
For European organizations, especially those operating in the hospitality, food delivery, or restaurant sectors using WordPress with the Delisho plugin, this vulnerability could lead to unauthorized modification of menu data, pricing, or order processing workflows. Such unauthorized changes could damage business reputation, cause financial loss, or disrupt customer experience. Although the confidentiality and availability impacts are minimal, integrity violations could undermine trust in online ordering systems. Furthermore, if attackers leverage this vulnerability as a foothold, it could be a stepping stone to broader compromise within the WordPress environment, potentially exposing other plugins or sensitive data. Given the widespread use of WordPress across Europe and the popularity of food service websites, the vulnerability poses a moderate risk, particularly to small and medium enterprises that may not have rigorous security monitoring or patch management processes.
Mitigation Recommendations
Since no official patch is currently available, European organizations should take immediate steps to mitigate risk. These include: 1) Restricting access to the WordPress admin and plugin management interfaces to trusted IP addresses or VPN users only; 2) Implementing strict role-based access controls within WordPress to ensure users have only the minimum necessary privileges; 3) Monitoring logs for unusual activity related to the Delisho plugin, such as unexpected changes to menu items or orders; 4) Temporarily disabling or uninstalling the Delisho plugin if it is not critical to business operations until a patch is released; 5) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints; 6) Keeping WordPress core and all other plugins updated to reduce the attack surface; and 7) Preparing incident response plans specific to WordPress plugin abuse scenarios. Organizations should also subscribe to vendor and security mailing lists to receive timely updates on patches or exploit disclosures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:29.870Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d72b6179aa5c9d0854f48a
Added to database: 9/27/2025, 12:10:09 AM
Last enriched: 9/27/2025, 12:14:49 AM
Last updated: 11/15/2025, 9:51:12 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13221: Unprotected Storage of Credentials in Intelbras UnniTI
MediumCVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free
MediumCVE-2025-13210: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-13208: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-13203: SQL Injection in code-projects Simple Cafe Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.