CVE-2025-59551
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-22

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Missing Authorization vulnerability in WP Chill Revive.so revive-so allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Revive.so: from n/a through <= 2.0.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-22
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-09-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack revive.so_plugin 2.0.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-59551 is a Broken Access Control vulnerability in the WordPress Revive.so plugin (versions up to 2.0.6). It occurs due to missing authorization, authentication, or nonce token checks in certain functions, which allows users with low-level (subscriber) privileges to perform actions that should be restricted to higher privilege levels. [1]


How can this vulnerability impact me? :

This vulnerability can allow unprivileged users to perform unauthorized actions within the Revive.so plugin, potentially leading to misuse or manipulation of plugin functionality. Although the severity is low (CVSS 4.3), exploitation could compromise the integrity of the affected website's operations. Users are advised to update to version 2.0.7 or later to mitigate this risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking the version of the Revive.so WordPress plugin installed on your system. Versions up to and including 2.0.6 are vulnerable. Since the vulnerability arises from missing authorization checks, there are no specific network commands provided for detection. It is recommended to verify the plugin version via WordPress admin or by inspecting the plugin files. Additionally, professional incident response services are recommended if compromise is suspected, as plugin-based malware scanners may be unreliable. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Revive.so plugin to version 2.0.7 or later, where the vulnerability has been fixed. Alternatively, Patchstack offers virtual patching (vPatching) to auto-mitigate the vulnerability before official patches are applied. Users should prioritize timely updates and consider professional incident response services if a compromise is suspected. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart