Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6786: CWE-284 Improper Access Control in antwerpes DocCheck Login

0
Medium
VulnerabilityCVE-2025-6786cvecve-2025-6786cwe-284
Published: Fri Jul 04 2025 (07/04/2025, 01:43:59 UTC)
Source: CVE Database V5
Vendor/Project: antwerpes
Product: DocCheck Login

Description

The DocCheck Login plugin for WordPress is vulnerable to unauthorized post access in all versions up to, and including, 1.1.5. This is due to plugin redirecting a user to login on a password protected post after the page has loaded. This makes it possible for unauthenticated attackers to read posts they should not have access to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:51:57 UTC

Technical Analysis

The vulnerability identified as CVE-2025-6786 affects the DocCheck Login plugin for WordPress, developed by antwerpes. This plugin is designed to restrict access to certain posts by requiring user authentication. However, due to improper access control (CWE-284), the plugin redirects unauthenticated users to a login page only after the content of a password-protected post has already been loaded and rendered. This sequence flaw allows unauthenticated attackers to bypass intended access restrictions and read the content of protected posts without logging in. The vulnerability impacts all versions up to and including 1.1.5. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and results in partial confidentiality loss without affecting integrity or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The root cause is a failure to enforce access control before content delivery, violating the principle of least privilege and secure authentication flow.

Potential Impact

This vulnerability allows unauthorized disclosure of sensitive or confidential information contained within password-protected posts on WordPress sites using the affected DocCheck Login plugin. Organizations relying on this plugin for content access control risk exposing private data to any unauthenticated visitor, potentially leading to information leakage, privacy violations, and reputational damage. While the vulnerability does not allow modification or deletion of content, the confidentiality breach can be significant if the protected posts contain sensitive medical, personal, or proprietary information. This could affect healthcare providers, research institutions, or any organization using DocCheck Login to protect restricted content. The ease of exploitation (no authentication or user interaction required) increases the risk of automated scanning and data harvesting by attackers. Although no active exploitation is currently known, the vulnerability's presence in all versions up to 1.1.5 means many sites remain at risk until patched or mitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade the DocCheck Login plugin to a version that properly enforces access control before content delivery once a patch is released. In the absence of an official patch, administrators should consider temporarily disabling the plugin or restricting access to affected posts via alternative methods such as native WordPress password protection or third-party access control plugins with verified security. Implementing web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts to protected posts can provide interim protection. Site owners should audit their WordPress installations for the presence of this plugin and review access logs for suspicious activity. Additionally, developers should review the plugin’s authentication flow to ensure that content is never rendered before verifying user credentials, adhering to secure coding practices for access control. Regular security assessments and monitoring for updates from the vendor are essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-27T12:44:15.802Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fd0

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 2/26/2026, 3:51:57 PM

Last updated: 3/26/2026, 9:20:03 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses