CVE-2025-67575: Missing Authorization in Andrew Lima Sitewide Notice WP
Missing Authorization vulnerability in Andrew Lima Sitewide Notice WP sitewide-notice-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sitewide Notice WP: from n/a through <= 2.4.1.
AI Analysis
Technical Summary
CVE-2025-67575 identifies a missing authorization vulnerability in the Andrew Lima Sitewide Notice WP plugin, which is used to display sitewide notices on WordPress websites. The vulnerability arises from incorrectly configured access control security levels, allowing unauthenticated attackers to perform actions that should be restricted. Specifically, the plugin fails to properly verify whether a requestor has the necessary permissions before executing certain functions, leading to unauthorized access to sensitive information or functionality. The affected versions include all releases up to and including 2.4.1. The CVSS 3.1 base score of 5.3 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Although no public exploits have been reported, the vulnerability presents a risk to websites using this plugin, as attackers could leverage it to gather information or perform unauthorized actions that could aid further attacks. The lack of authentication requirement and ease of exploitation increase the risk, but the limited impact confines the severity to medium. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by administrators.
Potential Impact
For European organizations, the primary impact of CVE-2025-67575 lies in unauthorized access to potentially sensitive sitewide notice configurations or data, which could lead to information disclosure. While the vulnerability does not directly compromise data integrity or availability, unauthorized access could facilitate reconnaissance or social engineering attacks, increasing the risk of subsequent exploitation. Organizations relying on WordPress sites with the affected plugin, especially those in sectors handling personal data or critical communications, may face reputational damage or regulatory scrutiny under GDPR if unauthorized disclosures occur. The vulnerability's network-exploitable nature means attackers can attempt exploitation remotely without credentials, increasing exposure. However, the limited confidentiality impact and absence of integrity or availability effects reduce the overall business risk. Still, public sector websites, e-commerce platforms, and media outlets in Europe using this plugin should consider the risk significant enough to warrant immediate attention.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Monitor official Andrew Lima and WordPress plugin repositories for updates or patches addressing CVE-2025-67575 and apply them promptly once available. 2) In the interim, restrict access to the plugin's administrative or configuration endpoints via web application firewalls (WAFs) or server-level access controls to trusted IP addresses only. 3) Employ WordPress security plugins that enforce stricter role-based access controls and monitor unauthorized access attempts. 4) Conduct thorough audits of sitewide notice configurations and logs to detect any suspicious activity or unauthorized changes. 5) Educate site administrators about the vulnerability and the importance of minimizing plugin usage to only trusted and necessary components. 6) Consider disabling or removing the Sitewide Notice WP plugin if it is not essential, to eliminate the attack surface. 7) Implement network segmentation and monitoring to detect anomalous traffic patterns targeting WordPress sites. These measures go beyond generic advice by focusing on access restriction, monitoring, and plugin management tailored to this specific vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-67575: Missing Authorization in Andrew Lima Sitewide Notice WP
Description
Missing Authorization vulnerability in Andrew Lima Sitewide Notice WP sitewide-notice-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sitewide Notice WP: from n/a through <= 2.4.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67575 identifies a missing authorization vulnerability in the Andrew Lima Sitewide Notice WP plugin, which is used to display sitewide notices on WordPress websites. The vulnerability arises from incorrectly configured access control security levels, allowing unauthenticated attackers to perform actions that should be restricted. Specifically, the plugin fails to properly verify whether a requestor has the necessary permissions before executing certain functions, leading to unauthorized access to sensitive information or functionality. The affected versions include all releases up to and including 2.4.1. The CVSS 3.1 base score of 5.3 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Although no public exploits have been reported, the vulnerability presents a risk to websites using this plugin, as attackers could leverage it to gather information or perform unauthorized actions that could aid further attacks. The lack of authentication requirement and ease of exploitation increase the risk, but the limited impact confines the severity to medium. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by administrators.
Potential Impact
For European organizations, the primary impact of CVE-2025-67575 lies in unauthorized access to potentially sensitive sitewide notice configurations or data, which could lead to information disclosure. While the vulnerability does not directly compromise data integrity or availability, unauthorized access could facilitate reconnaissance or social engineering attacks, increasing the risk of subsequent exploitation. Organizations relying on WordPress sites with the affected plugin, especially those in sectors handling personal data or critical communications, may face reputational damage or regulatory scrutiny under GDPR if unauthorized disclosures occur. The vulnerability's network-exploitable nature means attackers can attempt exploitation remotely without credentials, increasing exposure. However, the limited confidentiality impact and absence of integrity or availability effects reduce the overall business risk. Still, public sector websites, e-commerce platforms, and media outlets in Europe using this plugin should consider the risk significant enough to warrant immediate attention.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Monitor official Andrew Lima and WordPress plugin repositories for updates or patches addressing CVE-2025-67575 and apply them promptly once available. 2) In the interim, restrict access to the plugin's administrative or configuration endpoints via web application firewalls (WAFs) or server-level access controls to trusted IP addresses only. 3) Employ WordPress security plugins that enforce stricter role-based access controls and monitor unauthorized access attempts. 4) Conduct thorough audits of sitewide notice configurations and logs to detect any suspicious activity or unauthorized changes. 5) Educate site administrators about the vulnerability and the importance of minimizing plugin usage to only trusted and necessary components. 6) Consider disabling or removing the Sitewide Notice WP plugin if it is not essential, to eliminate the attack surface. 7) Implement network segmentation and monitoring to detect anomalous traffic patterns targeting WordPress sites. These measures go beyond generic advice by focusing on access restriction, monitoring, and plugin management tailored to this specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:34.120Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ab29cea75c35ae56e9
Added to database: 12/9/2025, 2:35:23 PM
Last enriched: 1/21/2026, 1:02:17 AM
Last updated: 2/7/2026, 3:51:11 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.