Description
The Webcake – Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webcake_save_config' AJAX endpoint in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings.
Published: 2025-12-05
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Configuration Modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability in the Webcake – Landing Page Builder plugin arises from a missing capability check on the webcake_save_config AJAX endpoint. This flaw allows authenticated users with Subscriber-level access or higher to modify the plugin’s settings, enabling them to alter the look, structure, or behavior of the landing pages on the affected WordPress site. Because the plugin controls key visual elements and potentially redirection logic, an attacker could inject malicious content, change URLs, or deface the site. The weakness is identified as CWE-862 – missing authorization, which means the integrity of configuration data is compromised without consideration of the user’s role.

Affected Systems

WordPress sites using the Webcake – Landing Page Builder plugin, versions up to and including 1.1. Any authenticated user who holds the Subscriber role or any higher role can exploit this flaw.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, but the EPSS score of less than 1% suggests a low probability of exploitation under current threat landscape. The flaw is not listed in CISA’s KEV catalog, so there is no known large-scale active exploitation. The attack requires the attacker to be authenticated to the WordPress installation, typically by credential compromise or social engineering. Once authenticated, the attacker can invoke the vulnerable AJAX endpoint to change plugin settings, which may have widespread impact on the site’s storefront or landing pages. Therefore, the risk is significant for organizations with less stringent role management but the likelihood of immediate exploitation is low.

Generated by OpenCVE AI on April 22, 2026 at 11:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Webcake – Landing Page Builder plugin to version 1.2 or later, which includes the capability check for the webcake_save_config endpoint.
  • Limit the Subscriber role (or any role that can authenticate) from accessing the site's core administration or AJAX endpoints by adjusting WordPress capability settings or using a security plugin to restrict role permissions.
  • Remove or disable any unused or test subscriber accounts that could be used by attackers to exploit the missing authorization check.

Generated by OpenCVE AI on April 22, 2026 at 11:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000


Fri, 05 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 05 Dec 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Webcake – Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webcake_save_config' AJAX endpoint in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings.
Title Webcake – Landing Page Builder <= 1.1 - Missing Authorization to Authenticated (Subscriber+) Settings Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:19.133Z

Reserved: 2025-10-24T14:16:57.300Z

Link: CVE-2025-12165

cve-icon Vulnrichment

Updated: 2025-12-05T15:18:13.748Z

cve-icon NVD

Status : Deferred

Published: 2025-12-05T06:16:06.237

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12165

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses