Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67575: Missing Authorization in Andrew Lima Sitewide Notice WP

0
Medium
VulnerabilityCVE-2025-67575cvecve-2025-67575
Published: Tue Dec 09 2025 (12/09/2025, 14:14:13 UTC)
Source: CVE Database V5
Vendor/Project: Andrew Lima
Product: Sitewide Notice WP

Description

Missing Authorization vulnerability in Andrew Lima Sitewide Notice WP sitewide-notice-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sitewide Notice WP: from n/a through <= 2.4.1.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:05:28 UTC

Technical Analysis

CVE-2025-67575 identifies a missing authorization vulnerability in the Andrew Lima Sitewide Notice WP plugin for WordPress, affecting versions up to and including 2.4.1. The core issue stems from incorrectly configured access control security levels, which fail to properly restrict actions to authorized users. This misconfiguration allows attackers to bypass authorization checks and perform actions that should be limited to administrators or privileged roles. Although no known exploits have been reported in the wild, the vulnerability presents a significant risk because it undermines the fundamental security principle of access control. The plugin is used to display sitewide notices, and unauthorized manipulation could lead to unauthorized content injection, defacement, or other malicious modifications impacting site integrity and user trust. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further evaluation. The vulnerability does not require user interaction but depends on the attacker’s ability to access the plugin interface or endpoints exposed by the plugin. The scope is limited to sites using the affected plugin versions, but given WordPress's widespread use, the potential attack surface is considerable. The vulnerability affects confidentiality and integrity primarily, with availability impact being less likely unless combined with other exploits.

Potential Impact

For European organizations, the impact of CVE-2025-67575 can be significant, especially for those relying on WordPress sites with the affected plugin installed. Unauthorized access could lead to unauthorized content changes, site defacement, or injection of misleading or malicious notices, damaging brand reputation and user trust. Confidential information displayed or managed via the site could be exposed or altered. Organizations in sectors such as e-commerce, government, education, and media, which often use WordPress for public-facing websites, may face increased risk. The vulnerability could also be leveraged as a foothold for further attacks, including phishing or malware distribution. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid exploitation once public proof-of-concept code emerges is high. The impact is compounded by the plugin’s role in sitewide messaging, which can influence all site visitors and users.

Mitigation Recommendations

1. Monitor the Andrew Lima Sitewide Notice WP plugin repository and official channels for patches addressing CVE-2025-67575 and apply updates immediately upon release. 2. Until patches are available, restrict access to the WordPress admin panel and plugin management interfaces using IP whitelisting, VPN access, or multi-factor authentication to reduce unauthorized access risk. 3. Audit user roles and permissions to ensure only trusted administrators have plugin management rights. 4. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized attempts to access or manipulate the plugin’s endpoints. 5. Regularly review sitewide notices and content for unauthorized changes or suspicious activity. 6. Employ security plugins that monitor file integrity and alert on unauthorized modifications. 7. Educate site administrators on the risks of unauthorized plugin access and encourage strong password policies. 8. Consider temporarily disabling or removing the plugin if it is not critical to operations until a secure version is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:34.120Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ab29cea75c35ae56e9

Added to database: 12/9/2025, 2:35:23 PM

Last enriched: 12/9/2025, 3:05:28 PM

Last updated: 12/10/2025, 11:50:48 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats