CVE-2025-66145: CWE-862 Missing Authorization in merkulove Worker for WPBakery
Missing Authorization vulnerability in merkulove Worker for WPBakery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Worker for WPBakery: from n/a through 1.1.1.
AI Analysis
Technical Summary
CVE-2025-66145 identifies a missing authorization vulnerability (CWE-862) in the merkulove Worker for WPBakery plugin, affecting versions up to 1.1.1. This vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges (PR:L) to perform unauthorized actions that can modify data integrity or disrupt availability without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur remotely, typically through web requests to the WordPress site hosting the plugin. The vulnerability does not impact confidentiality but can lead to integrity and availability issues, such as unauthorized content changes or denial of service conditions. No patches or fixes have been published yet, and no active exploits are reported in the wild, indicating a window for proactive mitigation. The plugin is commonly used to extend WPBakery’s functionality, a popular WordPress page builder, thus potentially affecting a wide range of websites that rely on this ecosystem. The vulnerability’s CVSS 3.1 score of 5.4 reflects a medium severity level, balancing the ease of exploitation with the limited scope of impact and the requirement for some privileges. The root cause is the lack of proper authorization checks on sensitive operations within the plugin, allowing privilege escalation or unauthorized actions by authenticated users with low-level access.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the merkulove Worker for WPBakery plugin. Potential impacts include unauthorized modification of website content, disruption of service availability, and possible defacement or injection of malicious content. This can damage brand reputation, reduce customer trust, and lead to compliance issues under regulations like GDPR if personal data integrity is compromised. E-commerce platforms and public-facing corporate websites are particularly vulnerable, as attackers could manipulate product information or disrupt sales operations. The requirement for low-level privileges means that insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Although no known exploits exist currently, the public disclosure increases the risk of future attacks. The lack of patches means organizations must rely on compensating controls until updates are available. Given the widespread use of WPBakery in Europe, the threat could affect a significant number of sites, especially those not following strict access control policies.
Mitigation Recommendations
Organizations should immediately audit and restrict access permissions for users interacting with the merkulove Worker for WPBakery plugin, ensuring only trusted administrators have the necessary privileges. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the plugin’s endpoints. Monitor logs for unusual activity indicative of unauthorized access attempts or privilege escalation. Disable or remove the plugin if it is not essential to reduce the attack surface. Keep WordPress core and all plugins up to date and subscribe to vendor security advisories for timely patch releases. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials. Conduct regular security assessments and penetration testing focusing on access control mechanisms. Prepare incident response plans to quickly address any exploitation attempts. Consider isolating critical web services behind VPNs or IP whitelisting where feasible to limit exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-66145: CWE-862 Missing Authorization in merkulove Worker for WPBakery
Description
Missing Authorization vulnerability in merkulove Worker for WPBakery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Worker for WPBakery: from n/a through 1.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66145 identifies a missing authorization vulnerability (CWE-862) in the merkulove Worker for WPBakery plugin, affecting versions up to 1.1.1. This vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges (PR:L) to perform unauthorized actions that can modify data integrity or disrupt availability without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur remotely, typically through web requests to the WordPress site hosting the plugin. The vulnerability does not impact confidentiality but can lead to integrity and availability issues, such as unauthorized content changes or denial of service conditions. No patches or fixes have been published yet, and no active exploits are reported in the wild, indicating a window for proactive mitigation. The plugin is commonly used to extend WPBakery’s functionality, a popular WordPress page builder, thus potentially affecting a wide range of websites that rely on this ecosystem. The vulnerability’s CVSS 3.1 score of 5.4 reflects a medium severity level, balancing the ease of exploitation with the limited scope of impact and the requirement for some privileges. The root cause is the lack of proper authorization checks on sensitive operations within the plugin, allowing privilege escalation or unauthorized actions by authenticated users with low-level access.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the merkulove Worker for WPBakery plugin. Potential impacts include unauthorized modification of website content, disruption of service availability, and possible defacement or injection of malicious content. This can damage brand reputation, reduce customer trust, and lead to compliance issues under regulations like GDPR if personal data integrity is compromised. E-commerce platforms and public-facing corporate websites are particularly vulnerable, as attackers could manipulate product information or disrupt sales operations. The requirement for low-level privileges means that insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Although no known exploits exist currently, the public disclosure increases the risk of future attacks. The lack of patches means organizations must rely on compensating controls until updates are available. Given the widespread use of WPBakery in Europe, the threat could affect a significant number of sites, especially those not following strict access control policies.
Mitigation Recommendations
Organizations should immediately audit and restrict access permissions for users interacting with the merkulove Worker for WPBakery plugin, ensuring only trusted administrators have the necessary privileges. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the plugin’s endpoints. Monitor logs for unusual activity indicative of unauthorized access attempts or privilege escalation. Disable or remove the plugin if it is not essential to reduce the attack surface. Keep WordPress core and all plugins up to date and subscribe to vendor security advisories for timely patch releases. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials. Conduct regular security assessments and penetration testing focusing on access control mechanisms. Prepare incident response plans to quickly address any exploitation attempts. Consider isolating critical web services behind VPNs or IP whitelisting where feasible to limit exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:23:07.863Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955807ddb813ff03efdb3f7
Added to database: 12/31/2025, 7:58:53 PM
Last enriched: 1/21/2026, 12:35:17 AM
Last updated: 2/6/2026, 1:53:46 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.