CVE-2025-11172
BaseFortify
Publication date: 2025-10-24
Last updated on: 2025-10-27
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | check_plagiarism | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Check Plagiarism plugin for WordPress, where a missing capability check in a specific function allows authenticated users with Subscriber-level access or higher to modify data they should not be able to. Specifically, they can update the API key without proper authorization.
How can this vulnerability impact me? :
An attacker with Subscriber-level access or above could exploit this vulnerability to change the API key used by the plugin, potentially disrupting plugin functionality or enabling further unauthorized actions that rely on the API key.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Check Plagiarism plugin for WordPress to a version later than 2.0 where the missing capability check is fixed. Additionally, restrict Subscriber-level users from accessing or modifying plugin settings until the update is applied.