Skip to main content

CVE-2025-8152: CWE-862 Missing Authorization in blendmedia WP CTA

Medium
VulnerabilityCVE-2025-8152cvecve-2025-8152cwe-862
Published: Sat Aug 02 2025 (08/02/2025, 07:24:21 UTC)
Source: CVE Database V5
Vendor/Project: blendmedia
Product: WP CTA

Description

The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to update the status of a sticky and update the name displayed in the back-end WP CTA Dashboard.

AI-Powered Analysis

AILast updated: 08/02/2025, 07:48:20 UTC

Technical Analysis

CVE-2025-8152 is a medium-severity vulnerability affecting the WordPress plugin 'WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons' developed by blendmedia. The vulnerability arises from a missing authorization check (CWE-862) in two critical functions: 'update_cta_status' and 'change_sticky_sidebar_name'. These functions are responsible for updating the status of sticky call-to-action elements and modifying the displayed name in the back-end WP CTA Dashboard. Due to the absence of proper capability checks, unauthenticated attackers can invoke these functions remotely without any authentication or user interaction, allowing them to alter the status and names of sticky CTAs. This could lead to unauthorized modifications of the website's call-to-action elements, potentially misleading users or disrupting marketing campaigns. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability effects. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions up to and including 1.7.0 of the plugin, which is widely used in WordPress environments for managing sticky CTAs and buttons.

Potential Impact

For European organizations, this vulnerability could have several implications. Although it does not directly compromise sensitive data confidentiality or system availability, unauthorized modification of call-to-action elements can undermine the integrity of web content, potentially damaging brand reputation and user trust. Attackers could manipulate CTAs to redirect users to malicious sites, display misleading information, or disrupt marketing efforts, which could have financial and reputational consequences. Organizations relying heavily on WordPress for their web presence, especially e-commerce, media, or service providers using the WP CTA plugin, are at risk. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks or mass exploitation attempts. While no known exploits exist yet, the public disclosure and medium severity score suggest that attackers may develop exploits in the near future. European organizations must consider the potential for targeted campaigns exploiting this vulnerability to influence user behavior or conduct phishing attacks via compromised CTAs.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations for the presence of the WP CTA plugin, especially versions up to 1.7.0. 2) Disable or remove the plugin if it is not essential to reduce the attack surface. 3) Monitor official vendor channels and WordPress plugin repositories for patches or updates addressing CVE-2025-8152 and apply them promptly once available. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'update_cta_status' and 'change_sticky_sidebar_name' endpoints. 5) Conduct regular security assessments and penetration tests focusing on WordPress plugins to identify similar missing authorization issues. 6) Educate web administrators on the importance of plugin security and the risks of using outdated or unmaintained plugins. 7) Employ monitoring and alerting for unusual changes in CTA elements or dashboard modifications that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-25T00:44:57.020Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688dbf27ad5a09ad00d1fb00

Added to database: 8/2/2025, 7:32:55 AM

Last enriched: 8/2/2025, 7:48:20 AM

Last updated: 8/2/2025, 9:16:27 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats