Home

Description

The Post Type Switcher plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.0.0 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to modify the post type of arbitrary posts and pages they do not own, including those created by administrators, which can lead to site disruption, broken navigation, and SEO impact.

PUBLISHED Reserved 2025-10-30 | Published 2025-11-18 | Updated 2025-11-18 | Assigner Wordfence




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-17:Disclosed

Credits

Athiwat Tiprasaharn finder

References

www.wordfence.com/...-c7d3-4236-842b-6e772048448d?source=cve

plugins.trac.wordpress.org/...s/4.0.0/post-type-switcher.php

plugins.trac.wordpress.org/...s/4.0.0/post-type-switcher.php

cwe.mitre.org/data/definitions/639.html

owasp.org/...2023/en/0xa1-broken-object-level-authorization/

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2025-12524)

nvd.nist.gov (CVE-2025-12524)

Download JSON