CVE-2025-62087: CWE-862 Missing Authorization in Web Builder 143 Sticky Notes for WP Dashboard
Missing Authorization vulnerability in Web Builder 143 Sticky Notes for WP Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sticky Notes for WP Dashboard: from n/a through 1.2.4.
AI Analysis
Technical Summary
CVE-2025-62087 is classified under CWE-862, indicating a missing authorization vulnerability in the Web Builder 143 Sticky Notes for WP Dashboard WordPress plugin, specifically affecting versions up to 1.2.4. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required) to access or retrieve data they should not be authorized to view. The CVSS 3.1 base score is 4.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability enables unauthorized disclosure of sensitive information stored within the Sticky Notes plugin on WordPress dashboards, potentially exposing internal notes or sensitive operational data. Exploitation does not require user interaction and can be performed remotely, but the attacker must have some level of authenticated access. No patches or known exploits are currently available or reported, but the issue is publicly disclosed and assigned a CVE ID. The vulnerability highlights the importance of proper access control enforcement in WordPress plugins that handle sensitive or internal data.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of potentially sensitive internal notes or operational information stored within the Sticky Notes plugin on WordPress dashboards. This could lead to information leakage that may aid further attacks such as social engineering or reconnaissance. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach can undermine trust and compliance, especially under GDPR where unauthorized data exposure is a serious concern. Organizations relying on this plugin for internal communications or note-taking on WordPress dashboards may face risks of sensitive information exposure to unauthorized users with limited privileges. The medium severity rating indicates that while the risk is not critical, it is significant enough to warrant timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have access to the Sticky Notes plugin features. 2. Restrict access to the plugin’s dashboard components to the minimum necessary user roles. 3. Monitor and log access to the Sticky Notes plugin to detect any unauthorized attempts or unusual activity. 4. Apply principle of least privilege for all users interacting with the WordPress dashboard. 5. Stay alert for official patches or updates from Web Builder 143 and apply them promptly once released. 6. Consider temporarily disabling or uninstalling the Sticky Notes plugin if sensitive data exposure risk is unacceptable and no patch is available. 7. Conduct regular security reviews of all WordPress plugins, focusing on access control mechanisms. 8. Educate administrators and users about the risks of storing sensitive information in dashboard notes or plugins lacking robust access controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-62087: CWE-862 Missing Authorization in Web Builder 143 Sticky Notes for WP Dashboard
Description
Missing Authorization vulnerability in Web Builder 143 Sticky Notes for WP Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sticky Notes for WP Dashboard: from n/a through 1.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-62087 is classified under CWE-862, indicating a missing authorization vulnerability in the Web Builder 143 Sticky Notes for WP Dashboard WordPress plugin, specifically affecting versions up to 1.2.4. This vulnerability arises due to incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required) to access or retrieve data they should not be authorized to view. The CVSS 3.1 base score is 4.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability enables unauthorized disclosure of sensitive information stored within the Sticky Notes plugin on WordPress dashboards, potentially exposing internal notes or sensitive operational data. Exploitation does not require user interaction and can be performed remotely, but the attacker must have some level of authenticated access. No patches or known exploits are currently available or reported, but the issue is publicly disclosed and assigned a CVE ID. The vulnerability highlights the importance of proper access control enforcement in WordPress plugins that handle sensitive or internal data.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of potentially sensitive internal notes or operational information stored within the Sticky Notes plugin on WordPress dashboards. This could lead to information leakage that may aid further attacks such as social engineering or reconnaissance. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach can undermine trust and compliance, especially under GDPR where unauthorized data exposure is a serious concern. Organizations relying on this plugin for internal communications or note-taking on WordPress dashboards may face risks of sensitive information exposure to unauthorized users with limited privileges. The medium severity rating indicates that while the risk is not critical, it is significant enough to warrant timely remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have access to the Sticky Notes plugin features. 2. Restrict access to the plugin’s dashboard components to the minimum necessary user roles. 3. Monitor and log access to the Sticky Notes plugin to detect any unauthorized attempts or unusual activity. 4. Apply principle of least privilege for all users interacting with the WordPress dashboard. 5. Stay alert for official patches or updates from Web Builder 143 and apply them promptly once released. 6. Consider temporarily disabling or uninstalling the Sticky Notes plugin if sensitive data exposure risk is unacceptable and no patch is available. 7. Conduct regular security reviews of all WordPress plugins, focusing on access control mechanisms. 8. Educate administrators and users about the risks of storing sensitive information in dashboard notes or plugins lacking robust access controls.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-07T15:34:56.057Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69554bc2db813ff03ef247f6
Added to database: 12/31/2025, 4:13:54 PM
Last enriched: 1/20/2026, 10:20:28 PM
Last updated: 2/7/2026, 6:29:13 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.