Home

Description

The Takeads plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.0.13. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the plugin's configuration options.

PUBLISHED Reserved 2025-10-27 | Published 2025-12-05 | Updated 2025-12-05 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-04:Disclosed

Credits

Nabil Irawan finder

References

www.wordfence.com/...-7572-439e-a284-d59ef5de08f3?source=cve

plugins.trac.wordpress.org/...k/tags/1.0.13/src/MLP_Ajax.php

cve.org (CVE-2025-12370)

nvd.nist.gov (CVE-2025-12370)