Description
The Popup Builder (Easy Notify Lite) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the easynotify_cp_reset() function in all versions up to, and including, 1.1.37. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset plugin settings to their default values.
Published: 2025-12-13
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Integrity disruption of plugin settings
Action: Upgrade Plugin
AI Analysis

Impact

The Easy Notify Lite plugin allows any authenticated user with Subscriber level or higher to execute the easynotify_cp_reset function without a proper capability check. This flaw permits the attacker to reset all plugin configuration to the default state, potentially disabling custom notifications, altering site behavior, or causing a denial of service through configuration loss. The vulnerability is rooted in a missing authorization check (CWE-862).

Affected Systems

The issue affects the Easy Notify Lite plugin developed by GhozyLab, with all releases up to and including version 1.1.37. No other products or later versions are listed as impacted in the current data.

Risk and Exploitability

The CVSS score of 5.4 indicates medium severity. The EPSS score of less than 1% suggests a relatively low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Because the exploit requires only authenticated access at the Subscriber level or above, an attacker who has compromised or obtained a Subscriber account can trigger the reset with a simple HTTP request to the plugin’s action endpoint. No additional system or network privileges are needed beyond those granted to the user role.

Generated by OpenCVE AI on April 20, 2026 at 21:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Easy Notify Lite to a version newer than 1.1.37 that includes the missing capability check.
  • If an update cannot be applied immediately, remove or restrict the edit_plugins capability from the Subscriber role or use a role‑management plugin to block access to the plugin’s reset function.
  • Disabling the plugin entirely until a proper fix is in place eliminates the risk of unauthorized reset actions.

Generated by OpenCVE AI on April 20, 2026 at 21:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Ghozylab
Ghozylab popup Builder
Wordpress
Wordpress wordpress
Vendors & Products Ghozylab
Ghozylab popup Builder
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Popup Builder (Easy Notify Lite) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the easynotify_cp_reset() function in all versions up to, and including, 1.1.37. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset plugin settings to their default values.
Title Popup Builder <= 1.1.37 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Settings Reset
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Ghozylab Popup Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:35.912Z

Reserved: 2025-12-10T13:48:41.524Z

Link: CVE-2025-14446

cve-icon Vulnrichment

Updated: 2025-12-15T15:24:54.997Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:49.717

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:30:18Z

Weaknesses