Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66151: CWE-862 Missing Authorization in merkulove Countdowner for Elementor

0
Medium
VulnerabilityCVE-2025-66151cvecve-2025-66151cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 18:32:49 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: Countdowner for Elementor

Description

Missing Authorization vulnerability in merkulove Countdowner for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Countdowner for Elementor: from n/a through 1.0.4.

AI-Powered Analysis

AILast updated: 12/31/2025, 22:16:48 UTC

Technical Analysis

CVE-2025-66151 identifies a missing authorization vulnerability (CWE-862) in the merkulove Countdowner plugin for Elementor, a WordPress plugin used to display countdown timers. The vulnerability exists due to improperly configured access control mechanisms, which fail to restrict certain actions to authorized users only. This allows users with limited privileges (PR:L) to perform operations that should be restricted, potentially leading to unauthorized modification or disruption of the plugin's functionality. The CVSS 3.1 base score is 5.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), and no user interaction (UI:N). The impact affects integrity and availability but not confidentiality, meaning attackers can alter or disrupt plugin behavior but not access sensitive data. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin versions up to 1.0.4 are affected, though the exact range is unspecified. This issue is particularly relevant for WordPress sites using Elementor with merkulove Countdowner, which are common in marketing and event-related websites.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized changes in website content or functionality where the Countdowner plugin is used, potentially disrupting marketing campaigns, event countdowns, or user experience. Integrity of displayed information could be compromised, leading to misinformation or loss of trust. Availability impacts could cause countdown timers to malfunction or disappear, affecting business operations reliant on timely event notifications. While confidentiality is not directly impacted, the disruption or manipulation of web content can have reputational and operational consequences. Organizations with public-facing websites using this plugin are at risk, especially those in sectors relying heavily on event-driven marketing such as retail, entertainment, and hospitality. The medium severity score suggests moderate risk but warrants timely mitigation to prevent exploitation, especially given the ease of network-based exploitation and no required user interaction.

Mitigation Recommendations

1. Monitor merkulove and Elementor plugin updates closely and apply patches immediately once available to address this vulnerability. 2. Until patches are released, restrict plugin access to trusted administrators only and review user roles and permissions to minimize exposure. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the plugin’s endpoints. 4. Conduct regular audits of WordPress user accounts and plugin configurations to ensure no unauthorized privilege escalation is possible. 5. Employ security plugins that can detect unauthorized changes to plugin files or configurations. 6. Educate site administrators on the risks of granting excessive privileges and enforce the principle of least privilege. 7. Consider temporarily disabling the Countdowner plugin if it is not critical to operations until a fix is available. 8. Monitor website logs for unusual activity related to the plugin’s functionality to detect early exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:07.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045d87

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 12/31/2025, 10:16:48 PM

Last updated: 1/7/2026, 4:12:39 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats