Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62960: CWE-862 Missing Authorization in Sparkle WP Construction Light

0
Medium
VulnerabilityCVE-2025-62960cvecve-2025-62960cwe-862
Published: Thu Dec 18 2025 (12/18/2025, 16:51:56 UTC)
Source: CVE Database V5
Vendor/Project: Sparkle WP
Product: Construction Light

Description

Missing Authorization vulnerability in Sparkle WP Construction Light allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Construction Light: from n/a through 1.6.7.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:03:44 UTC

Technical Analysis

CVE-2025-62960 is a missing authorization vulnerability classified under CWE-862 affecting the Sparkle WP Construction Light WordPress plugin up to version 1.6.7. The vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges (PR:L) to perform actions they are not authorized to execute. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) indicates that the vulnerability is remotely exploitable over the network with low attack complexity, requires privileges but no user interaction, and impacts integrity and availability without affecting confidentiality. Exploiting this flaw could allow an attacker to modify or disrupt plugin functionality or data, potentially affecting the website’s operation or data integrity. Although no known exploits are currently reported in the wild and no patches have been released, the vulnerability poses a tangible risk, especially for websites relying on this plugin for construction-related content or services. The issue stems from missing or insufficient authorization checks in the plugin’s code, which should enforce strict role-based access controls to prevent unauthorized actions. Given the plugin’s niche use in construction-related WordPress sites, the attack surface is somewhat limited but still significant for affected users. The vulnerability was reserved in October 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those in the construction sector or managing construction-related websites using WordPress and the Sparkle WP Construction Light plugin, this vulnerability could lead to unauthorized modifications of website content or disruption of services. This may result in data integrity issues, loss of availability of certain site functionalities, and potential reputational damage. Since the vulnerability does not impact confidentiality, direct data breaches are less likely, but the integrity and availability impacts could affect business operations, client trust, and compliance with data integrity requirements under regulations like GDPR. Organizations relying on this plugin for critical workflows or customer-facing services may experience operational disruptions. The medium severity rating reflects a moderate risk that should be addressed promptly to prevent exploitation, especially as the vulnerability is remotely exploitable with low complexity.

Mitigation Recommendations

1. Immediately review and audit user roles and permissions within WordPress to ensure the principle of least privilege is enforced, minimizing the number of users with elevated privileges. 2. Restrict access to the Construction Light plugin’s administrative functions to trusted users only, potentially using additional authentication mechanisms such as two-factor authentication (2FA). 3. Monitor logs and website activity for unusual or unauthorized actions related to the plugin, including unexpected changes or disruptions. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin’s endpoints. 5. Stay informed about vendor updates and apply official patches as soon as they become available. 6. If immediate patching is not possible, consider temporarily disabling the plugin or restricting its functionality until a fix is released. 7. Conduct code reviews or penetration testing focused on access control mechanisms within the plugin to identify and remediate similar authorization issues proactively. 8. Educate site administrators about the risks of privilege escalation and the importance of secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:25:01.199Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944323d4eb3efac369b379a

Added to database: 12/18/2025, 4:56:29 PM

Last enriched: 1/20/2026, 11:03:44 PM

Last updated: 2/4/2026, 4:35:08 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats