Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8565: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

0
High
VulnerabilityCVE-2025-8565cvecve-2025-8565cwe-862
Published: Thu Sep 18 2025 (09/18/2025, 09:31:29 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages

Description

The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the wplp_gdpr_install_plugin_ajax_handler() function in all versions up to, and including, 3.4.3. This makes it possible for authenticated attackers, with Contributor-level access and above, to install arbitrary repository plugins.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:14:57 UTC

Technical Analysis

CVE-2025-8565 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Legal Pages WordPress plugin, specifically in the Privacy Policy Generator and Terms & Conditions Generator functionality. The vulnerability exists due to the absence of a proper capability check in the wplp_gdpr_install_plugin_ajax_handler() function, which handles AJAX requests related to plugin installation. This flaw allows any authenticated user with at least Contributor-level access to bypass normal authorization controls and install arbitrary plugins from the WordPress repository. Since Contributors typically do not have plugin installation rights, this escalates their privileges significantly, potentially enabling them to execute malicious code, alter site behavior, or disrupt availability. The vulnerability affects all versions up to and including 3.4.3 of the plugin. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or higher), no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The vulnerability is particularly dangerous because it leverages legitimate WordPress plugin installation mechanisms, making detection and prevention more challenging without proper authorization checks.

Potential Impact

The impact of CVE-2025-8565 is significant for organizations using the WP Legal Pages plugin on WordPress sites. Unauthorized plugin installation can lead to full site compromise, including the execution of arbitrary code, data manipulation, defacement, or denial of service. Attackers with Contributor-level access, which is a relatively low privilege, can escalate their capabilities to administrator-level actions by installing malicious plugins. This undermines the integrity and availability of the affected websites. For organizations, this can result in data breaches, loss of customer trust, service outages, and potential regulatory penalties if personal data is compromised. The vulnerability's network accessibility and lack of required user interaction increase the risk of automated exploitation attempts, especially on sites with multiple contributors or weak access controls. The absence of confidentiality impact in the CVSS score indicates that direct data disclosure is not the primary concern, but the integrity and availability risks are critical. The threat is particularly acute for high-traffic or business-critical WordPress sites relying on this plugin for legal compliance documentation.

Mitigation Recommendations

To mitigate CVE-2025-8565 effectively, organizations should: 1) Immediately restrict Contributor and lower roles from accessing plugin installation functionalities by customizing WordPress capabilities or using role management plugins to enforce least privilege principles. 2) Monitor and audit user roles and permissions regularly to ensure no unauthorized privilege escalation occurs. 3) Apply updates or patches from the WP Legal Pages plugin vendor as soon as they are released to address the missing authorization check. 4) Implement Web Application Firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting plugin installation endpoints. 5) Employ security plugins that monitor file changes and plugin installations to alert administrators of unauthorized activities. 6) Educate site administrators and contributors about the risks of privilege misuse and enforce strong authentication mechanisms, including multi-factor authentication for higher privilege accounts. 7) Consider temporarily disabling or replacing the WP Legal Pages plugin if immediate patching is not possible, especially on high-risk or public-facing sites. These steps go beyond generic advice by focusing on role-based access control hardening, proactive monitoring, and layered defenses tailored to the vulnerability's exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-04T20:31:21.140Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cc13c146e444568e341cc4

Added to database: 9/18/2025, 2:14:25 PM

Last enriched: 2/26/2026, 5:14:57 PM

Last updated: 3/25/2026, 2:48:12 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses