CVE-2025-13309
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-06

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Accessiy By CodeConfig Accessibility – Easy One-Click Accessibility Toolbar That Truly Matters plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.0.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers with subscriber-level access and above to modify the plugin’s global accessibility settings.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-06
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2025-12-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
codeconfig accessibility *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Accessiy By CodeConfig Accessibility plugin for WordPress (up to version 1.0.0) and is an authorization bypass issue. It occurs because the plugin does not properly verify whether a user is authorized to perform certain actions. As a result, authenticated users with subscriber-level access or higher can modify the plugin's global accessibility settings, which they should not normally be able to do.


How can this vulnerability impact me? :

The vulnerability allows authenticated users with low-level access (subscriber and above) to change global accessibility settings of the plugin. This could lead to unauthorized changes that affect the accessibility features of the website, potentially disrupting user experience or enabling further exploitation depending on how these settings are used.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the CVE-2025-13309 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA. The vulnerability allows authenticated users with subscriber-level access to modify global accessibility settings due to authorization bypass, but there is no explicit mention of data privacy, personal data exposure, or regulatory compliance implications in the provided resources.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, you can monitor AJAX requests related to the CodeConfig Accessibility plugin's settings update actions, particularly those targeting the 'UpdateSettings' AJAX action. Look for unauthorized or suspicious POST requests to admin-ajax.php with the action parameter set to 'ccpcaUpdateSettings' or similar. Since the vulnerability involves authorization bypass allowing subscriber-level users to modify global accessibility settings, you can check for unexpected changes in plugin settings or audit logs for such AJAX calls. Commands to detect such activity could include using web server logs or network monitoring tools to filter requests, for example: 1. Using grep on web server logs to find AJAX update requests: `grep 'action=ccpcaUpdateSettings' /var/log/apache2/access.log` 2. Using curl to test if a subscriber-level user can perform update actions (requires authentication): `curl -X POST -d 'action=ccpcaUpdateSettings&ccpca_nonce=NONCE_VALUE&data=...' https://yourwordpresssite.com/wp-admin/admin-ajax.php` 3. Using WordPress CLI or plugins to audit recent changes to plugin settings or user capabilities. Note that exact commands depend on your environment and logging setup. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the CodeConfig Accessibility plugin to a version later than 1.0.0 where the vulnerability is fixed. 2. Restrict access to the plugin's AJAX actions by ensuring proper capability checks and nonce verifications are enforced. 3. Temporarily disable or restrict the plugin if an update is not immediately available. 4. Monitor and audit user roles and permissions, especially subscriber-level accounts, to prevent unauthorized changes. 5. Implement web application firewall (WAF) rules to block suspicious AJAX requests targeting the plugin's settings update endpoints. 6. Review and harden WordPress security settings, including limiting plugin management capabilities to trusted users only. These steps help prevent unauthorized modification of global accessibility settings via the authorization bypass vulnerability. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart