Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66155: CWE-862 Missing Authorization in merkulove Questionar for Elementor

0
Medium
VulnerabilityCVE-2025-66155cvecve-2025-66155cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 17:00:37 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: Questionar for Elementor

Description

Missing Authorization vulnerability in merkulove Questionar for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Questionar for Elementor: from n/a through 1.1.7.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:37:35 UTC

Technical Analysis

CVE-2025-66155 identifies a Missing Authorization vulnerability classified under CWE-862 in the merkulove Questionar plugin for Elementor, a WordPress plugin used to create interactive questionnaires. The vulnerability arises from incorrectly configured access control mechanisms, allowing users with limited privileges (PR:L) to perform unauthorized actions that should be restricted. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) indicates that the attack can be conducted remotely over the network without user interaction, requires low attack complexity, and only limited privileges, but does not compromise confidentiality. Instead, it impacts integrity and availability, meaning attackers could alter or disrupt questionnaire data or functionality. The plugin versions affected include all up to 1.1.7, though the exact initial vulnerable version is unspecified. No patches or known exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin component poses a risk to websites relying on it for user engagement and data collection. The issue was reserved in late 2025 and published at the end of 2025, indicating a recent discovery. The lack of a patch link suggests that remediation is pending or in development. This vulnerability could be exploited to manipulate questionnaire content, disrupt service availability, or perform unauthorized actions within the plugin's scope, potentially impacting website reliability and user trust.

Potential Impact

For European organizations, the impact of CVE-2025-66155 can be significant, particularly for those relying on WordPress sites with the Elementor page builder and the merkulove Questionar plugin. Unauthorized modification or disruption of questionnaire data can lead to misinformation, loss of user trust, and potential operational disruptions if these questionnaires are used for customer feedback, lead generation, or internal surveys. The integrity and availability impacts could affect business processes dependent on accurate data collection. Additionally, compromised sites might be leveraged for further attacks or reputational damage. Since the vulnerability requires only limited privileges, attackers who gain low-level access (e.g., through compromised user accounts) can escalate their impact without needing full administrative rights. This increases the risk profile for organizations with multiple user roles and less stringent privilege management. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are available or if the vulnerability becomes public knowledge.

Mitigation Recommendations

Organizations should monitor the merkulove Questionar plugin for official security updates and apply patches immediately upon release. Until a patch is available, restrict plugin access to trusted users only and review user roles and permissions to minimize the number of accounts with privileges that could exploit this vulnerability. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. Conduct regular audits of WordPress user accounts and plugin configurations to ensure no unauthorized changes occur. Additionally, consider isolating critical questionnaire data and backing it up frequently to enable recovery in case of integrity or availability compromise. Employ security monitoring tools to detect anomalous behavior related to the plugin and maintain incident response readiness. Finally, educate site administrators about the risks of privilege escalation and the importance of strong credential management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:13.460Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69555a03db813ff03ef4dd91

Added to database: 12/31/2025, 5:14:43 PM

Last enriched: 1/21/2026, 12:37:35 AM

Last updated: 2/5/2026, 12:19:37 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats