CVE-2025-12005
📋 TL;DR
This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to modify sensitive plugin options without proper authorization checks. It affects all versions of the WP VR – 360 Panorama and Free Virtual Tour Builder plugin up to and including 8.5.41. This could lead to unauthorized configuration changes affecting site functionality.
💻 Affected Systems
- WP VR – 360 Panorama and Free Virtual Tour Builder For WordPress
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker could modify critical plugin settings to disable security features, inject malicious code, or disrupt virtual tour functionality across the entire WordPress site.
Likely Case
Malicious contributors or compromised accounts could alter plugin configurations to degrade functionality, insert tracking scripts, or prepare for further attacks.
If Mitigated
With proper user access controls and monitoring, impact is limited to minor configuration changes that can be detected and reverted.
🎯 Exploit Status
Exploitation requires authenticated access with at least contributor privileges. Attackers would need to understand WordPress plugin structure and AJAX endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 8.5.41
Vendor Advisory: https://plugins.trac.wordpress.org/browser/wpvr
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP VR – 360 Panorama and Free Virtual Tour Builder'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patched version is released.
🔧 Temporary Workarounds
Restrict User Permissions
allTemporarily reduce contributor-level users to subscriber roles or implement strict user access controls.
Disable Plugin AJAX Endpoints
allUse WordPress hooks or security plugins to block unauthorized access to vulnerable AJAX endpoints.
🧯 If You Can't Patch
- Deactivate the WP VR plugin completely until patched version is available.
- Implement web application firewall rules to block suspicious AJAX requests to the plugin endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins. If WP VR plugin version is 8.5.41 or lower, the system is vulnerable.
Check Version:
wp plugin list --name='wpvr' --field=version
Verify Fix Applied:
After updating, verify plugin version is higher than 8.5.41. Test with contributor account that AJAX endpoints now properly check capabilities.
📡 Detection & Monitoring
Log Indicators:
- Unusual AJAX requests to /wp-admin/admin-ajax.php with action parameters related to wpvr plugin from contributor-level users
- Multiple failed capability checks in WordPress debug logs
Network Indicators:
- POST requests to admin-ajax.php containing 'wpvr_' action parameters from unauthorized user roles
SIEM Query:
source="wordpress.log" AND "admin-ajax.php" AND "wpvr_" AND (user_role="contributor" OR user_role="author" OR user_role="editor")