CVE-2025-14395
Unauthorized Data Modification in Popover Windows WordPress Plugin
Publication date: 2025-12-13
Last updated on: 2025-12-13
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | popover_windows_plugin | 1.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Popover Windows plugin for WordPress, where there is a missing capability check on multiple ajax actions such as pop_submit and poptheme_submit. This flaw allows authenticated users with subscriber-level access or higher to modify the plugin's settings and content without proper authorization.
How can this vulnerability impact me? :
An attacker with subscriber-level access or above can exploit this vulnerability to change the plugin's settings and content, potentially leading to unauthorized modifications that could affect the website's behavior or appearance.