Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62087: CWE-862 Missing Authorization in Web Builder 143 Sticky Notes for WP Dashboard

0
Medium
VulnerabilityCVE-2025-62087cvecve-2025-62087cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 16:08:58 UTC)
Source: CVE Database V5
Vendor/Project: Web Builder 143
Product: Sticky Notes for WP Dashboard

Description

Missing Authorization vulnerability in Web Builder 143 Sticky Notes for WP Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sticky Notes for WP Dashboard: from n/a through 1.2.4.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:20:28 UTC

Technical Analysis

CVE-2025-62087 is classified under CWE-862, indicating a missing authorization vulnerability in the Web Builder 143 Sticky Notes for WP Dashboard WordPress plugin, specifically affecting versions up to 1.2.4. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required) to access or retrieve data they should not be authorized to view. The CVSS 3.1 base score is 4.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability enables unauthorized disclosure of sensitive information stored within the Sticky Notes plugin on WordPress dashboards, potentially exposing internal notes or sensitive operational data. Exploitation does not require user interaction and can be performed remotely, but the attacker must have some level of authenticated access. No patches or known exploits are currently available or reported, but the issue is publicly disclosed and assigned a CVE ID. The vulnerability highlights the importance of proper access control enforcement in WordPress plugins that handle sensitive or internal data.

Potential Impact

For European organizations, the primary impact is the unauthorized disclosure of potentially sensitive internal notes or operational information stored within the Sticky Notes plugin on WordPress dashboards. This could lead to information leakage that may aid further attacks such as social engineering or reconnaissance. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach can undermine trust and compliance, especially under GDPR where unauthorized data exposure is a serious concern. Organizations relying on this plugin for internal communications or note-taking on WordPress dashboards may face risks of sensitive information exposure to unauthorized users with limited privileges. The medium severity rating indicates that while the risk is not critical, it is significant enough to warrant timely remediation to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have access to the Sticky Notes plugin features. 2. Restrict access to the plugin’s dashboard components to the minimum necessary user roles. 3. Monitor and log access to the Sticky Notes plugin to detect any unauthorized attempts or unusual activity. 4. Apply principle of least privilege for all users interacting with the WordPress dashboard. 5. Stay alert for official patches or updates from Web Builder 143 and apply them promptly once released. 6. Consider temporarily disabling or uninstalling the Sticky Notes plugin if sensitive data exposure risk is unacceptable and no patch is available. 7. Conduct regular security reviews of all WordPress plugins, focusing on access control mechanisms. 8. Educate administrators and users about the risks of storing sensitive information in dashboard notes or plugins lacking robust access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:34:56.057Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69554bc2db813ff03ef247f6

Added to database: 12/31/2025, 4:13:54 PM

Last enriched: 1/20/2026, 10:20:28 PM

Last updated: 2/7/2026, 6:29:13 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats