CVE-2025-12005

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to modify sensitive plugin options without proper authorization checks. It affects all versions of the WP VR – 360 Panorama and Free Virtual Tour Builder plugin up to and including 8.5.41. This could lead to unauthorized configuration changes affecting site functionality.

💻 Affected Systems

Products:
  • WP VR – 360 Panorama and Free Virtual Tour Builder For WordPress
Versions: All versions up to and including 8.5.41
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with contributor or higher permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could modify critical plugin settings to disable security features, inject malicious code, or disrupt virtual tour functionality across the entire WordPress site.

🟠

Likely Case

Malicious contributors or compromised accounts could alter plugin configurations to degrade functionality, insert tracking scripts, or prepare for further attacks.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to minor configuration changes that can be detected and reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with at least contributor privileges. Attackers would need to understand WordPress plugin structure and AJAX endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 8.5.41

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wpvr

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP VR – 360 Panorama and Free Virtual Tour Builder'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patched version is released.

🔧 Temporary Workarounds

Restrict User Permissions

all

Temporarily reduce contributor-level users to subscriber roles or implement strict user access controls.

Disable Plugin AJAX Endpoints

all

Use WordPress hooks or security plugins to block unauthorized access to vulnerable AJAX endpoints.

🧯 If You Can't Patch

  • Deactivate the WP VR plugin completely until patched version is available.
  • Implement web application firewall rules to block suspicious AJAX requests to the plugin endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins. If WP VR plugin version is 8.5.41 or lower, the system is vulnerable.

Check Version:

wp plugin list --name='wpvr' --field=version

Verify Fix Applied:

After updating, verify plugin version is higher than 8.5.41. Test with contributor account that AJAX endpoints now properly check capabilities.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action parameters related to wpvr plugin from contributor-level users
  • Multiple failed capability checks in WordPress debug logs

Network Indicators:

  • POST requests to admin-ajax.php containing 'wpvr_' action parameters from unauthorized user roles

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "wpvr_" AND (user_role="contributor" OR user_role="author" OR user_role="editor")

🔗 References

📤 Share & Export