The Takeads plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.0.13. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the plugin's configuration options.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 05 Dec 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Takeads plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.0.13. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the plugin's configuration options. | |
| Title | Takeads <= 1.0.13 - Missing Authorization to Plugin Settings Deletion | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-05T05:31:26.817Z
Reserved: 2025-10-27T20:15:45.237Z
Link: CVE-2025-12370
No data.
Status : Received
Published: 2025-12-05T06:16:07.233
Modified: 2025-12-05T06:16:07.233
Link: CVE-2025-12370
No data.
OpenCVE Enrichment
No data.
Weaknesses