Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67582: Missing Authorization in wbcomdesigns Wbcom Designs

0
Medium
VulnerabilityCVE-2025-67582cvecve-2025-67582
Published: Tue Dec 09 2025 (12/09/2025, 14:14:15 UTC)
Source: CVE Database V5
Vendor/Project: wbcomdesigns
Product: Wbcom Designs

Description

Missing Authorization vulnerability in wbcomdesigns Wbcom Designs lock-my-bp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wbcom Designs: from n/a through <= 2.1.1.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:04:07 UTC

Technical Analysis

CVE-2025-67582 identifies a missing authorization vulnerability in the Wbcom Designs WordPress plugin 'lock-my-bp' up to version 2.1.1. This vulnerability arises from incorrectly configured access control security levels, allowing unauthenticated remote attackers to bypass authorization checks. Specifically, the flaw permits attackers to access certain data or functionality that should be restricted, impacting confidentiality but not integrity or availability. The vulnerability does not require any privileges or user interaction to exploit, making it accessible over the network. However, the scope is limited to data exposure rather than system compromise or denial of service. The CVSS 3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) reflects a network attack vector with low attack complexity, no privileges or user interaction needed, and limited confidentiality impact. No public exploits or active exploitation have been reported to date. The vulnerability affects all versions up to 2.1.1, though the exact affected versions are not fully enumerated. The issue was published on December 9, 2025, and assigned by Patchstack. No official patches or mitigation links are currently provided, indicating that users should monitor vendor advisories closely. Given the plugin’s use in WordPress environments, the vulnerability primarily threatens websites using this plugin for business or community purposes.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of data managed by the Wbcom Designs plugin. Organizations relying on this plugin for business processes, membership management, or community engagement could have sensitive information exposed to unauthorized parties. While the vulnerability does not allow system takeover or service disruption, unauthorized data access could lead to information leakage, reputational damage, or compliance issues under GDPR. The ease of exploitation without authentication increases risk, especially for publicly accessible websites. However, the absence of known exploits and limited impact on integrity and availability reduce the overall threat level. Organizations in sectors with high regulatory scrutiny or handling personal data are particularly vulnerable to the confidentiality breach. The impact is also influenced by the extent of plugin deployment within the organization’s web infrastructure.

Mitigation Recommendations

1. Monitor Wbcom Designs vendor channels and Patchstack advisories for official patches addressing CVE-2025-67582 and apply them promptly upon release. 2. Conduct an immediate audit of access control configurations within the 'lock-my-bp' plugin settings to identify and remediate any misconfigurations. 3. Restrict public access to sensitive plugin functionality or data through web application firewalls (WAF) or server-level access controls until patches are applied. 4. Implement network-level monitoring and alerting for unusual access patterns targeting the plugin endpoints. 5. Review and tighten WordPress user roles and permissions to minimize exposure. 6. Consider temporary disabling or replacing the affected plugin if critical data exposure risk is unacceptable and no patch is available. 7. Educate site administrators about the vulnerability and encourage vigilance for suspicious activity. 8. Regularly back up website data to enable recovery in case of exploitation or related incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:34.121Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ad29cea75c35ae5711

Added to database: 12/9/2025, 2:35:25 PM

Last enriched: 1/21/2026, 1:04:07 AM

Last updated: 2/7/2026, 2:31:07 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats