Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66143: Missing Authorization in merkulove Crumber

0
Medium
VulnerabilityCVE-2025-66143cvecve-2025-66143
Published: Thu Jan 22 2026 (01/22/2026, 16:51:50 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: Crumber

Description

Missing Authorization vulnerability in merkulove Crumber crumber-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Crumber: from n/a through <= 1.0.10.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:31:25 UTC

Technical Analysis

CVE-2025-66143 is a missing authorization vulnerability identified in the merkulove Crumber plugin, specifically in the crumber-elementor component, affecting versions up to and including 1.0.10. This vulnerability arises due to incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized actions. The vulnerability is exploitable remotely over the network (AV:N) without requiring user interaction (UI:N). The CVSS v3.1 base score of 5.4 reflects a medium severity, with impacts on integrity and availability but no confidentiality loss. The scope remains unchanged (S:U), meaning the exploit affects only the vulnerable component without extending to other system components. The vulnerability could allow an attacker to manipulate or disrupt the plugin’s functionality, potentially leading to unauthorized content changes or denial of service conditions. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability was reserved in November 2025 and published in January 2026. The lack of patches necessitates immediate attention to access control configurations and monitoring to mitigate risk until vendor updates are available.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of web applications using the Crumber plugin. Attackers with low-level privileges could exploit the missing authorization to alter plugin behavior, potentially defacing websites, injecting malicious content, or causing service disruptions. This could lead to reputational damage, loss of customer trust, and operational downtime. Since the vulnerability does not impact confidentiality, direct data breaches are less likely; however, integrity compromises can indirectly lead to data trust issues. Organizations relying on Crumber for critical web functionalities may experience degraded service or require emergency incident response. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit development could follow publication. European entities with public-facing websites or e-commerce platforms using this plugin are particularly vulnerable to exploitation attempts, which could be leveraged in broader attack campaigns or targeted attacks.

Mitigation Recommendations

1. Immediately audit and restrict access permissions to the Crumber plugin’s administrative and configuration interfaces, ensuring only trusted users have low-level privileges. 2. Implement strict role-based access controls (RBAC) and verify that authorization checks are enforced consistently across all plugin functionalities. 3. Monitor web server and application logs for unusual or unauthorized activity related to the Crumber plugin, including unexpected requests or changes. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Crumber endpoints. 5. Isolate or sandbox environments running the plugin to limit potential impact in case of exploitation. 6. Stay informed on vendor communications and apply security patches or updates as soon as they become available. 7. Conduct penetration testing focused on access control mechanisms within the plugin to identify and remediate weaknesses proactively. 8. Educate administrators and developers about the risks of missing authorization and the importance of secure configuration management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:07.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259134623b1157c7fae1b

Added to database: 1/22/2026, 5:06:27 PM

Last enriched: 1/30/2026, 8:31:25 AM

Last updated: 2/8/2026, 8:36:23 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats