Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67575: Missing Authorization in Andrew Lima Sitewide Notice WP

0
Medium
VulnerabilityCVE-2025-67575cvecve-2025-67575
Published: Tue Dec 09 2025 (12/09/2025, 14:14:13 UTC)
Source: CVE Database V5
Vendor/Project: Andrew Lima
Product: Sitewide Notice WP

Description

Missing Authorization vulnerability in Andrew Lima Sitewide Notice WP sitewide-notice-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sitewide Notice WP: from n/a through <= 2.4.1.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:02:17 UTC

Technical Analysis

CVE-2025-67575 identifies a missing authorization vulnerability in the Andrew Lima Sitewide Notice WP plugin, which is used to display sitewide notices on WordPress websites. The vulnerability arises from incorrectly configured access control security levels, allowing unauthenticated attackers to perform actions that should be restricted. Specifically, the plugin fails to properly verify whether a requestor has the necessary permissions before executing certain functions, leading to unauthorized access to sensitive information or functionality. The affected versions include all releases up to and including 2.4.1. The CVSS 3.1 base score of 5.3 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Although no public exploits have been reported, the vulnerability presents a risk to websites using this plugin, as attackers could leverage it to gather information or perform unauthorized actions that could aid further attacks. The lack of authentication requirement and ease of exploitation increase the risk, but the limited impact confines the severity to medium. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by administrators.

Potential Impact

For European organizations, the primary impact of CVE-2025-67575 lies in unauthorized access to potentially sensitive sitewide notice configurations or data, which could lead to information disclosure. While the vulnerability does not directly compromise data integrity or availability, unauthorized access could facilitate reconnaissance or social engineering attacks, increasing the risk of subsequent exploitation. Organizations relying on WordPress sites with the affected plugin, especially those in sectors handling personal data or critical communications, may face reputational damage or regulatory scrutiny under GDPR if unauthorized disclosures occur. The vulnerability's network-exploitable nature means attackers can attempt exploitation remotely without credentials, increasing exposure. However, the limited confidentiality impact and absence of integrity or availability effects reduce the overall business risk. Still, public sector websites, e-commerce platforms, and media outlets in Europe using this plugin should consider the risk significant enough to warrant immediate attention.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Monitor official Andrew Lima and WordPress plugin repositories for updates or patches addressing CVE-2025-67575 and apply them promptly once available. 2) In the interim, restrict access to the plugin's administrative or configuration endpoints via web application firewalls (WAFs) or server-level access controls to trusted IP addresses only. 3) Employ WordPress security plugins that enforce stricter role-based access controls and monitor unauthorized access attempts. 4) Conduct thorough audits of sitewide notice configurations and logs to detect any suspicious activity or unauthorized changes. 5) Educate site administrators about the vulnerability and the importance of minimizing plugin usage to only trusted and necessary components. 6) Consider disabling or removing the Sitewide Notice WP plugin if it is not essential, to eliminate the attack surface. 7) Implement network segmentation and monitoring to detect anomalous traffic patterns targeting WordPress sites. These measures go beyond generic advice by focusing on access restriction, monitoring, and plugin management tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:34.120Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ab29cea75c35ae56e9

Added to database: 12/9/2025, 2:35:23 PM

Last enriched: 1/21/2026, 1:02:17 AM

Last updated: 2/7/2026, 3:32:27 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats