Skip to main content

CVE-2025-60148: CWE-862 Missing Authorization in wpshuffle Subscribe to Download

Medium
VulnerabilityCVE-2025-60148cvecve-2025-60148cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 08:31:51 UTC)
Source: CVE Database V5
Vendor/Project: wpshuffle
Product: Subscribe to Download

Description

Missing Authorization vulnerability in wpshuffle Subscribe to Download allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Subscribe to Download: from n/a through 2.0.9.

AI-Powered Analysis

AILast updated: 09/26/2025, 13:22:02 UTC

Technical Analysis

CVE-2025-60148 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the 'Subscribe to Download' plugin developed by wpshuffle. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing users with limited privileges (requiring some level of authentication but no user interaction) to perform actions or access functionality that should be restricted. Specifically, the vulnerability enables exploitation of incorrect access control security levels, potentially allowing an authenticated user with low privileges to escalate their capabilities or manipulate the plugin's subscription or download features without proper authorization. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. The affected versions include all versions up to 2.0.9, with no patch links currently provided. No known exploits have been reported in the wild as of the publication date (September 26, 2025). Given the plugin's role in managing subscription-based downloads, unauthorized access could lead to manipulation of subscription data or unauthorized downloads, potentially affecting business operations or revenue models relying on controlled content distribution.

Potential Impact

For European organizations using the 'Subscribe to Download' plugin, this vulnerability could lead to unauthorized modification of subscription or download permissions, undermining content access controls. This may result in loss of revenue for businesses relying on paywalled or subscription-based digital content, unauthorized distribution of proprietary materials, or manipulation of user subscription data. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact could damage trust with customers and partners. Organizations in sectors such as digital publishing, e-commerce, and online education that utilize this plugin are particularly at risk. Additionally, regulatory compliance under GDPR may be indirectly affected if subscription data integrity is compromised, leading to potential legal and reputational consequences.

Mitigation Recommendations

Given the absence of official patches, European organizations should first audit their use of the 'Subscribe to Download' plugin, identifying all instances and versions in use. Immediate mitigation steps include restricting access to the plugin's administrative and subscription management interfaces to only highly trusted users and roles, implementing additional access control layers at the web server or application firewall level to block unauthorized requests targeting the plugin's endpoints, and monitoring logs for unusual access patterns indicative of exploitation attempts. Organizations should also consider temporarily disabling the plugin if feasible until a patch is released. Regularly checking vendor communications and security advisories for updates or patches is critical. Furthermore, applying the principle of least privilege to all users interacting with the plugin and conducting penetration testing focused on access control weaknesses can help identify and remediate exploitation vectors proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:27:39.209Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d692e1828ba7f61ebe57d8

Added to database: 9/26/2025, 1:19:29 PM

Last enriched: 9/26/2025, 1:22:02 PM

Last updated: 9/29/2025, 8:09:16 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats