Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7664: CWE-862 Missing Authorization in loword AL Pack

0
High
VulnerabilityCVE-2025-7664cvecve-2025-7664cwe-862
Published: Sat Aug 16 2025 (08/16/2025, 03:38:50 UTC)
Source: CVE Database V5
Vendor/Project: loword
Product: AL Pack

Description

The AL Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the check_activate_permission() permission callback for the /wp-json/presslearn/v1/activate REST API endpoint in all versions up to, and including, 1.0.2. The callback reads the client-supplied Origin header and, after parsing, allows the request if it matches one of the trusted domains, without ever verifying user authentication, capabilities, or nonce tokens. This makes it possible for unauthenticated attackers to activate premium features by simply spoofing the Origin header.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:25:41 UTC

Technical Analysis

CVE-2025-7664 is a vulnerability classified under CWE-862 (Missing Authorization) found in the AL Pack plugin for WordPress, developed by loword. The issue exists in the check_activate_permission() callback function associated with the /wp-json/presslearn/v1/activate REST API endpoint. This function improperly authorizes requests by solely relying on the client-supplied Origin HTTP header to determine if the request comes from a trusted domain, without performing any user authentication, capability checks, or nonce verification. As a result, an attacker can craft a request with a spoofed Origin header matching a trusted domain and activate premium features of the plugin without any legitimate credentials or user interaction. This vulnerability affects all versions up to and including 1.0.2 of the AL Pack plugin. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and a high impact on integrity (unauthorized activation of premium features), but no impact on confidentiality or availability. Although no exploits have been reported in the wild, the flaw presents a significant risk to WordPress sites using this plugin, especially those monetizing premium features. The root cause is the absence of proper authorization checks, which should include verifying user capabilities and nonce tokens to ensure requests are legitimate and authorized. The vulnerability was publicly disclosed on August 16, 2025, and remains unpatched as no official patch links are provided.

Potential Impact

The primary impact of CVE-2025-7664 is unauthorized activation of premium features within the AL Pack plugin, which can lead to financial losses for plugin vendors and site owners due to license circumvention. Attackers can exploit this vulnerability remotely without authentication or user interaction, making it easy to abuse at scale. This compromises the integrity of the plugin’s licensing mechanism, potentially enabling widespread unauthorized use of paid features. While confidentiality and availability are not directly affected, the unauthorized feature activation can undermine trust in the affected websites and their services. For organizations relying on AL Pack for critical functionality or monetization, this could result in revenue loss, reputational damage, and increased support costs. Additionally, attackers might leverage the unauthorized access to further pivot or escalate privileges if combined with other vulnerabilities. The scope is broad since all versions up to 1.0.2 are affected, and WordPress’s global popularity means many sites could be impacted.

Mitigation Recommendations

To mitigate CVE-2025-7664, organizations should immediately implement strict server-side authorization checks for the /wp-json/presslearn/v1/activate endpoint. This includes verifying user authentication status, checking user capabilities or roles, and validating nonce tokens to ensure requests are legitimate and authorized. Do not rely solely on the Origin header for authorization decisions, as it can be easily spoofed. Site administrators should monitor plugin updates from loword and apply patches as soon as they become available. If no official patch exists, consider temporarily disabling the affected REST API endpoint or the AL Pack plugin until a fix is released. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests that spoof Origin headers or attempt unauthorized activations. Regularly audit plugin permissions and REST API endpoints for similar authorization weaknesses. Additionally, educate site administrators about the risks of installing plugins from unverified sources and encourage the use of security plugins that monitor for anomalous REST API activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T21:30:46.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad0074399b

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 2/26/2026, 4:25:41 PM

Last updated: 3/28/2026, 9:09:08 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses