CVE-2025-11632
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-10-30
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | call_now_button | 1.5.5 |
| wordfence | call_now_button | 1.5.3 |
| wordfence | call_now_button | 1.5.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Call Now Button WordPress plugin up to version 1.5.4, where multiple functions lack proper capability checks. This allows authenticated users with Subscriber-level access or higher to access sensitive billing portal features, such as viewing and modifying billing information, generating chat session tokens, and viewing domain status, without proper authorization.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow unauthorized users with low-level access to view and modify sensitive billing information, generate chat session tokens, and access domain status information. This could lead to unauthorized changes to billing data and potential misuse of chat sessions, impacting the security and integrity of your WordPress site and associated accounts.
What immediate steps should I take to mitigate this vulnerability?
Update the Call Now Button plugin to version 1.5.5 or later, as this version fully fixes the vulnerability. Avoid using versions up to and including 1.5.4, which are vulnerable.