The WP Headless CMS Framework plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.15. This is due to the plugin only checking for the existence of the Authorization header in a request when determining if the nonce protection should be bypassed. This makes it possible for unauthenticated attackers to access content they should not have access to.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 13 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The WP Headless CMS Framework plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.15. This is due to the plugin only checking for the existence of the Authorization header in a request when determining if the nonce protection should be bypassed. This makes it possible for unauthenticated attackers to access content they should not have access to.
Title WP Headless CMS Framework <= 1.15 - Unauthenticated Protection Mechanism Bypass
Weaknesses CWE-693
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-11-13T18:24:21.022Z

Reserved: 2025-10-03T12:43:32.593Z

Link: CVE-2025-11260

cve-icon Vulnrichment

Updated: 2025-11-13T18:24:10.987Z

cve-icon NVD

Status : Received

Published: 2025-11-13T09:15:46.623

Modified: 2025-11-13T09:15:46.623

Link: CVE-2025-11260

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-13T15:49:53Z