Home

Description

The Product Filter by WBW plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'approveNotice' action in all versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to update the plugin's settings.

PUBLISHED Reserved 2025-10-03 | Published 2025-10-25 | Updated 2025-10-27 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-21:Vendor Notified
2025-10-24:Disclosed

Credits

Lucas Montes finder

References

www.wordfence.com/...-0e5d-4c28-af04-52611ad583a8?source=cve

github.com/...ommit/313f69908cadc31fa9c1e098ff989dc4f75dfdb5

plugins.trac.wordpress.org/...t-filter&sfp_email=&sfph_mail=

cve.org (CVE-2025-11269)

nvd.nist.gov (CVE-2025-11269)

Download JSON