CVE-2025-8152: CWE-862 Missing Authorization in blendmedia WP CTA
The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to update the status of a sticky and update the name displayed in the back-end WP CTA Dashboard.
AI Analysis
Technical Summary
CVE-2025-8152 is a medium-severity vulnerability affecting the WordPress plugin 'WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons' developed by blendmedia. The vulnerability arises from a missing authorization check (CWE-862) in two critical functions: 'update_cta_status' and 'change_sticky_sidebar_name'. These functions are responsible for updating the status of sticky call-to-action elements and modifying the displayed name in the back-end WP CTA Dashboard. Due to the absence of proper capability checks, unauthenticated attackers can invoke these functions remotely without any authentication or user interaction, allowing them to alter the status and names of sticky CTAs. This could lead to unauthorized modifications of the website's call-to-action elements, potentially misleading users or disrupting marketing campaigns. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability effects. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions up to and including 1.7.0 of the plugin, which is widely used in WordPress environments for managing sticky CTAs and buttons.
Potential Impact
For European organizations, this vulnerability could have several implications. Although it does not directly compromise sensitive data confidentiality or system availability, unauthorized modification of call-to-action elements can undermine the integrity of web content, potentially damaging brand reputation and user trust. Attackers could manipulate CTAs to redirect users to malicious sites, display misleading information, or disrupt marketing efforts, which could have financial and reputational consequences. Organizations relying heavily on WordPress for their web presence, especially e-commerce, media, or service providers using the WP CTA plugin, are at risk. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks or mass exploitation attempts. While no known exploits exist yet, the public disclosure and medium severity score suggest that attackers may develop exploits in the near future. European organizations must consider the potential for targeted campaigns exploiting this vulnerability to influence user behavior or conduct phishing attacks via compromised CTAs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations for the presence of the WP CTA plugin, especially versions up to 1.7.0. 2) Disable or remove the plugin if it is not essential to reduce the attack surface. 3) Monitor official vendor channels and WordPress plugin repositories for patches or updates addressing CVE-2025-8152 and apply them promptly once available. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'update_cta_status' and 'change_sticky_sidebar_name' endpoints. 5) Conduct regular security assessments and penetration tests focusing on WordPress plugins to identify similar missing authorization issues. 6) Educate web administrators on the importance of plugin security and the risks of using outdated or unmaintained plugins. 7) Employ monitoring and alerting for unusual changes in CTA elements or dashboard modifications that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8152: CWE-862 Missing Authorization in blendmedia WP CTA
Description
The WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_cta_status' and 'change_sticky_sidebar_name' functions in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to update the status of a sticky and update the name displayed in the back-end WP CTA Dashboard.
AI-Powered Analysis
Technical Analysis
CVE-2025-8152 is a medium-severity vulnerability affecting the WordPress plugin 'WP CTA – Call To Action Plugin, Sticky CTA, Sticky Buttons' developed by blendmedia. The vulnerability arises from a missing authorization check (CWE-862) in two critical functions: 'update_cta_status' and 'change_sticky_sidebar_name'. These functions are responsible for updating the status of sticky call-to-action elements and modifying the displayed name in the back-end WP CTA Dashboard. Due to the absence of proper capability checks, unauthenticated attackers can invoke these functions remotely without any authentication or user interaction, allowing them to alter the status and names of sticky CTAs. This could lead to unauthorized modifications of the website's call-to-action elements, potentially misleading users or disrupting marketing campaigns. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability effects. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions up to and including 1.7.0 of the plugin, which is widely used in WordPress environments for managing sticky CTAs and buttons.
Potential Impact
For European organizations, this vulnerability could have several implications. Although it does not directly compromise sensitive data confidentiality or system availability, unauthorized modification of call-to-action elements can undermine the integrity of web content, potentially damaging brand reputation and user trust. Attackers could manipulate CTAs to redirect users to malicious sites, display misleading information, or disrupt marketing efforts, which could have financial and reputational consequences. Organizations relying heavily on WordPress for their web presence, especially e-commerce, media, or service providers using the WP CTA plugin, are at risk. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks or mass exploitation attempts. While no known exploits exist yet, the public disclosure and medium severity score suggest that attackers may develop exploits in the near future. European organizations must consider the potential for targeted campaigns exploiting this vulnerability to influence user behavior or conduct phishing attacks via compromised CTAs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations for the presence of the WP CTA plugin, especially versions up to 1.7.0. 2) Disable or remove the plugin if it is not essential to reduce the attack surface. 3) Monitor official vendor channels and WordPress plugin repositories for patches or updates addressing CVE-2025-8152 and apply them promptly once available. 4) Implement web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable functions, especially those attempting to invoke 'update_cta_status' and 'change_sticky_sidebar_name' endpoints. 5) Conduct regular security assessments and penetration tests focusing on WordPress plugins to identify similar missing authorization issues. 6) Educate web administrators on the importance of plugin security and the risks of using outdated or unmaintained plugins. 7) Employ monitoring and alerting for unusual changes in CTA elements or dashboard modifications that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-25T00:44:57.020Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688dbf27ad5a09ad00d1fb00
Added to database: 8/2/2025, 7:32:55 AM
Last enriched: 8/2/2025, 7:48:20 AM
Last updated: 8/2/2025, 9:16:27 AM
Views: 3
Related Threats
CVE-2025-7710: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Brave Brave Conversion Engine (PRO)
CriticalCVE-2025-7500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in oceanwp Ocean Social Sharing
MediumCVE-2025-8467: SQL Injection in code-projects Wazifa System
MediumCVE-2025-8488: CWE-862 Missing Authorization in brainstormforce Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder)
MediumCVE-2025-6722: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bitslip6 BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.