Home

Description

The WP Headless CMS Framework plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.15. This is due to the plugin only checking for the existence of the Authorization header in a request when determining if the nonce protection should be bypassed. This makes it possible for unauthenticated attackers to access content they should not have access to.

PUBLISHED Reserved 2025-10-03 | Published 2025-11-13 | Updated 2025-11-13 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-693 Protection Mechanism Failure

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-14:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-cb8f-4c12-86ed-2cdbb45ba873?source=cve

wordpress.org/plugins/wp-rest-headless/

cve.org (CVE-2025-11260)

nvd.nist.gov (CVE-2025-11260)

Download JSON