CVE-2025-66144: CWE-862 Missing Authorization in merkulove Worker for Elementor
Missing Authorization vulnerability in merkulove Worker for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Worker for Elementor: from n/a through 1.0.10.
AI Analysis
Technical Summary
CVE-2025-66144 identifies a missing authorization vulnerability (CWE-862) in the merkulove Worker for Elementor plugin, affecting versions up to 1.0.10. This vulnerability stems from improperly configured access control mechanisms within the plugin, which fails to adequately verify whether a user has the necessary permissions before allowing certain actions. The vulnerability allows an attacker with low privileges (PR:L) and network access (AV:N) to perform unauthorized operations without requiring user interaction (UI:N). The impact primarily affects integrity and availability, enabling attackers to modify plugin behavior or disrupt its functionality, potentially leading to degraded service or altered content. The vulnerability does not affect confidentiality, and the scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No patches were listed at the time of reporting, and no known exploits are currently active in the wild. The plugin is commonly used in WordPress environments, particularly in sites leveraging the Elementor page builder, which is popular across many European organizations for website design and content management. The vulnerability's medium CVSS score of 5.4 reflects the moderate risk posed by the ease of exploitation combined with limited impact on confidentiality but notable risks to integrity and availability.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modifications of website content or disruption of web services hosted on WordPress sites using the Worker for Elementor plugin. This may result in reputational damage, loss of customer trust, and potential downtime affecting business operations. Since the plugin is integrated with Elementor, widely used for website design, attackers could exploit this flaw to deface websites, inject malicious content, or disrupt user experience. Organizations in sectors relying heavily on their web presence, such as e-commerce, media, and public services, may face increased risks. The lack of confidentiality impact reduces the risk of data breaches, but integrity and availability impacts could still have significant operational consequences. The absence of known exploits in the wild currently lowers immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
Organizations should monitor vendor communications for patches addressing CVE-2025-66144 and apply updates promptly once available. In the interim, restrict access to the Worker for Elementor plugin functionalities by limiting user roles and permissions to only trusted administrators. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints. Conduct regular audits of user privileges and plugin configurations to ensure no excessive permissions are granted. Additionally, maintain robust website monitoring to detect unauthorized changes or service disruptions early. Consider isolating critical web infrastructure and employing intrusion detection systems (IDS) to identify exploitation attempts. Finally, educate site administrators about the risks of privilege escalation and the importance of applying security updates timely.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-66144: CWE-862 Missing Authorization in merkulove Worker for Elementor
Description
Missing Authorization vulnerability in merkulove Worker for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Worker for Elementor: from n/a through 1.0.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-66144 identifies a missing authorization vulnerability (CWE-862) in the merkulove Worker for Elementor plugin, affecting versions up to 1.0.10. This vulnerability stems from improperly configured access control mechanisms within the plugin, which fails to adequately verify whether a user has the necessary permissions before allowing certain actions. The vulnerability allows an attacker with low privileges (PR:L) and network access (AV:N) to perform unauthorized operations without requiring user interaction (UI:N). The impact primarily affects integrity and availability, enabling attackers to modify plugin behavior or disrupt its functionality, potentially leading to degraded service or altered content. The vulnerability does not affect confidentiality, and the scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No patches were listed at the time of reporting, and no known exploits are currently active in the wild. The plugin is commonly used in WordPress environments, particularly in sites leveraging the Elementor page builder, which is popular across many European organizations for website design and content management. The vulnerability's medium CVSS score of 5.4 reflects the moderate risk posed by the ease of exploitation combined with limited impact on confidentiality but notable risks to integrity and availability.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized modifications of website content or disruption of web services hosted on WordPress sites using the Worker for Elementor plugin. This may result in reputational damage, loss of customer trust, and potential downtime affecting business operations. Since the plugin is integrated with Elementor, widely used for website design, attackers could exploit this flaw to deface websites, inject malicious content, or disrupt user experience. Organizations in sectors relying heavily on their web presence, such as e-commerce, media, and public services, may face increased risks. The lack of confidentiality impact reduces the risk of data breaches, but integrity and availability impacts could still have significant operational consequences. The absence of known exploits in the wild currently lowers immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
Organizations should monitor vendor communications for patches addressing CVE-2025-66144 and apply updates promptly once available. In the interim, restrict access to the Worker for Elementor plugin functionalities by limiting user roles and permissions to only trusted administrators. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints. Conduct regular audits of user privileges and plugin configurations to ensure no excessive permissions are granted. Additionally, maintain robust website monitoring to detect unauthorized changes or service disruptions early. Consider isolating critical web infrastructure and employing intrusion detection systems (IDS) to identify exploitation attempts. Finally, educate site administrators about the risks of privilege escalation and the importance of applying security updates timely.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:23:07.863Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955807ddb813ff03efdb3f4
Added to database: 12/31/2025, 7:58:53 PM
Last enriched: 1/21/2026, 12:35:01 AM
Last updated: 2/6/2026, 8:50:32 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2011: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24930: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighCVE-2026-24929: CWE-476 NULL Pointer Dereference in Huawei HarmonyOS
MediumCVE-2026-24923: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-24922: CWE-122 Heap-based Buffer Overflow in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.