CVE-2025-24692

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to modify WordPress menu settings due to missing access control checks in the Bulk Menu Edit plugin. WordPress administrators are affected as attackers could alter navigation menus without proper permissions. The issue impacts all versions up to 1.3 of the plugin.

💻 Affected Systems

Products:
  • WordPress Bulk Menu Edit plugin
Versions: n/a through 1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No special configuration needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could deface websites by modifying navigation menus, redirect users to malicious sites through menu links, or disrupt site functionality by removing critical menu items.

🟠

Likely Case

Unauthorized users modifying menu structures to create confusion, insert spam links, or alter site navigation for malicious purposes.

🟢

If Mitigated

With proper user role management and authentication controls, impact is limited to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of WordPress REST API endpoints and authentication bypass techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/bulk-menu-edit/vulnerability/wordpress-bulk-menu-edit-plugin-1-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Bulk Menu Edit' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install fresh version 1.4+ from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Bulk Menu Edit plugin until patched version is available

wp plugin deactivate bulk-menu-edit

Restrict plugin access

all

Use WordPress role management to restrict access to menu editing capabilities

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized menu modification requests
  • Enable WordPress security plugins that monitor and alert on unauthorized administrative actions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Bulk Menu Edit version. If version is 1.3 or earlier, system is vulnerable.

Check Version:

wp plugin get bulk-menu-edit --field=version

Verify Fix Applied:

Verify plugin version is 1.4 or later in WordPress admin panel. Test menu editing functionality with non-admin user accounts to confirm proper authorization checks.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-json/bulk-menu-edit/ endpoints
  • Failed authentication attempts followed by successful menu modifications
  • User role escalation attempts in WordPress logs

Network Indicators:

  • HTTP requests to bulk-menu-edit API endpoints from unauthorized IPs
  • Unusual pattern of menu modification requests

SIEM Query:

source="wordpress.log" AND ("bulk-menu-edit" OR "menu_edit") AND (response_code=200 OR response_code=201) AND user_role!="administrator"

🔗 References

📤 Share & Export