CVE-2025-66077: Missing Authorization in wpWax Legal Pages
Missing Authorization vulnerability in wpWax Legal Pages legal-pages allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Legal Pages: from n/a through <= 1.4.6.
AI Analysis
Technical Summary
CVE-2025-66077 is a vulnerability identified in the wpWax Legal Pages WordPress plugin, specifically affecting versions up to and including 1.4.6. The core issue is a missing authorization control, meaning that certain administrative or sensitive functions within the plugin can be accessed by unauthorized users. This occurs due to incorrectly configured access control security levels, allowing attackers to bypass intended restrictions. The vulnerability is remotely exploitable over the network without requiring any privileges (PR:N), but it does require user interaction (UI:R), such as the victim clicking a malicious link or visiting a crafted page. The CVSS v3.1 base score is 4.3, indicating a medium severity. The impact is limited to confidentiality, with no direct effect on integrity or availability. This suggests that an attacker might be able to view or extract some sensitive information managed by the plugin but cannot modify or disrupt the service. No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The vulnerability affects the Legal Pages plugin, which is used to manage legal compliance content on WordPress sites, such as privacy policies, terms of service, and cookie notices. Because these pages often contain sensitive compliance information, unauthorized access could expose internal legal configurations or data. The missing authorization could be exploited by attackers to gather information that might aid further attacks or compliance violations. Given the plugin’s role, the vulnerability is primarily an information disclosure risk rather than a direct system compromise.
Potential Impact
For European organizations, the impact of CVE-2025-66077 centers on potential unauthorized disclosure of legal and compliance-related information managed by the wpWax Legal Pages plugin. This could lead to exposure of sensitive policy configurations or internal compliance details, potentially aiding attackers in crafting more targeted attacks or causing reputational damage. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could have regulatory implications under GDPR if personal data or compliance mechanisms are indirectly exposed. Organizations relying on WordPress sites with this plugin, especially those in regulated sectors such as finance, healthcare, or government, may face increased risk of compliance violations or data privacy concerns. The lack of known exploits reduces immediate risk, but the ease of exploitation (no privileges required) means attackers could leverage social engineering to trigger the vulnerability. The medium severity rating reflects the limited scope of impact but acknowledges the importance of legal and compliance data confidentiality in European regulatory environments.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit WordPress sites for the presence of the wpWax Legal Pages plugin and identify affected versions (<=1.4.6). 2) Restrict access to administrative and legal pages through additional web application firewall (WAF) rules or IP whitelisting to limit exposure. 3) Monitor web server and application logs for unusual access patterns or requests targeting legal pages, especially from unauthenticated users. 4) Educate users and administrators about phishing and social engineering risks that could trigger user interaction exploitation. 5) Apply principle of least privilege on WordPress user roles to minimize potential impact if exploitation occurs. 6) Stay alert for official patches or updates from wpWax and apply them promptly once released. 7) Consider temporary disabling or replacing the plugin with alternative solutions if immediate patching is not possible. 8) Conduct regular vulnerability scans and penetration tests focusing on access control weaknesses in WordPress plugins. These measures go beyond generic advice by focusing on access control hardening, monitoring, and user awareness tailored to this specific vulnerability context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-66077: Missing Authorization in wpWax Legal Pages
Description
Missing Authorization vulnerability in wpWax Legal Pages legal-pages allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Legal Pages: from n/a through <= 1.4.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-66077 is a vulnerability identified in the wpWax Legal Pages WordPress plugin, specifically affecting versions up to and including 1.4.6. The core issue is a missing authorization control, meaning that certain administrative or sensitive functions within the plugin can be accessed by unauthorized users. This occurs due to incorrectly configured access control security levels, allowing attackers to bypass intended restrictions. The vulnerability is remotely exploitable over the network without requiring any privileges (PR:N), but it does require user interaction (UI:R), such as the victim clicking a malicious link or visiting a crafted page. The CVSS v3.1 base score is 4.3, indicating a medium severity. The impact is limited to confidentiality, with no direct effect on integrity or availability. This suggests that an attacker might be able to view or extract some sensitive information managed by the plugin but cannot modify or disrupt the service. No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The vulnerability affects the Legal Pages plugin, which is used to manage legal compliance content on WordPress sites, such as privacy policies, terms of service, and cookie notices. Because these pages often contain sensitive compliance information, unauthorized access could expose internal legal configurations or data. The missing authorization could be exploited by attackers to gather information that might aid further attacks or compliance violations. Given the plugin’s role, the vulnerability is primarily an information disclosure risk rather than a direct system compromise.
Potential Impact
For European organizations, the impact of CVE-2025-66077 centers on potential unauthorized disclosure of legal and compliance-related information managed by the wpWax Legal Pages plugin. This could lead to exposure of sensitive policy configurations or internal compliance details, potentially aiding attackers in crafting more targeted attacks or causing reputational damage. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could have regulatory implications under GDPR if personal data or compliance mechanisms are indirectly exposed. Organizations relying on WordPress sites with this plugin, especially those in regulated sectors such as finance, healthcare, or government, may face increased risk of compliance violations or data privacy concerns. The lack of known exploits reduces immediate risk, but the ease of exploitation (no privileges required) means attackers could leverage social engineering to trigger the vulnerability. The medium severity rating reflects the limited scope of impact but acknowledges the importance of legal and compliance data confidentiality in European regulatory environments.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit WordPress sites for the presence of the wpWax Legal Pages plugin and identify affected versions (<=1.4.6). 2) Restrict access to administrative and legal pages through additional web application firewall (WAF) rules or IP whitelisting to limit exposure. 3) Monitor web server and application logs for unusual access patterns or requests targeting legal pages, especially from unauthenticated users. 4) Educate users and administrators about phishing and social engineering risks that could trigger user interaction exploitation. 5) Apply principle of least privilege on WordPress user roles to minimize potential impact if exploitation occurs. 6) Stay alert for official patches or updates from wpWax and apply them promptly once released. 7) Consider temporary disabling or replacing the plugin with alternative solutions if immediate patching is not possible. 8) Conduct regular vulnerability scans and penetration tests focusing on access control weaknesses in WordPress plugins. These measures go beyond generic advice by focusing on access control hardening, monitoring, and user awareness tailored to this specific vulnerability context.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:58.862Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69205c30c36be036e6ff2727
Added to database: 11/21/2025, 12:33:52 PM
Last enriched: 1/21/2026, 12:22:05 AM
Last updated: 2/7/2026, 10:48:22 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.