CVE-2025-26901

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in Brizy Pro WordPress plugin that allows attackers to bypass access controls. It affects all Brizy Pro installations up to version 2.6.1, potentially enabling unauthorized access to restricted functionality.

💻 Affected Systems

Products:
  • Brizy Pro WordPress Plugin
Versions: All versions up to and including 2.6.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Brizy Pro (premium version), not the free Brizy plugin. Requires WordPress installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify website content, inject malicious code, or access sensitive administrative functions without proper authentication.

🟠

Likely Case

Unauthorized users could modify pages, posts, or other content they shouldn't have access to, potentially defacing websites or inserting malicious content.

🟢

If Mitigated

With proper network segmentation and web application firewalls, impact would be limited to content modification within the WordPress instance.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress knowledge but is straightforward once the vulnerability is understood. Attackers need at least some level of access to the WordPress site.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/brizy-pro/vulnerability/wordpress-brizy-pro-plugin-2-6-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Brizy Pro and click 'Update Now'. 4. Verify update to version 2.6.2 or higher.

🔧 Temporary Workarounds

Disable Brizy Pro Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate brizy-pro

Restrict WordPress Admin Access

all

Limit access to WordPress admin area to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized content changes
  • Deploy web application firewall with WordPress-specific rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Brizy Pro version. If version is 2.6.1 or lower, system is vulnerable.

Check Version:

wp plugin list --name=brizy-pro --field=version

Verify Fix Applied:

Verify Brizy Pro plugin version is 2.6.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Brizy Pro endpoints
  • Unexpected content modifications by non-admin users

Network Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with brizy-related parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "brizy") AND user_role!="administrator"

🔗 References

📤 Share & Export