CVE-2025-66077

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Legal Pages WordPress plugin that allows attackers to bypass access controls and perform unauthorized actions. The vulnerability affects all WordPress sites running Legal Pages plugin versions up to and including 1.4.6. Attackers can exploit incorrectly configured access control security levels to gain unauthorized access to functionality.

💻 Affected Systems

Products:
  • WordPress Legal Pages Plugin
Versions: n/a through <= 1.4.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify legal pages content, inject malicious code, or access administrative functions leading to site compromise.

🟠

Likely Case

Unauthorized users can modify legal pages content or access restricted plugin functionality.

🟢

If Mitigated

Proper access controls and authentication prevent exploitation, limiting impact to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but bypasses authorization checks. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.4.6

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/legal-pages/vulnerability/wordpress-legal-pages-plugin-1-4-6-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Legal Pages plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until fixed version is released.

🔧 Temporary Workarounds

Disable Legal Pages Plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate legal-pages

Restrict Plugin Access

all

Use WordPress roles and capabilities to restrict access to Legal Pages functionality

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized access attempts
  • Use web application firewall rules to block suspicious requests to Legal Pages endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Legal Pages version <=1.4.6

Check Version:

wp plugin get legal-pages --field=version

Verify Fix Applied:

Verify Legal Pages plugin version is >1.4.6 after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Legal Pages admin endpoints
  • Unexpected modifications to legal page content

Network Indicators:

  • HTTP requests to /wp-admin/admin.php?page=legal-pages from unauthorized IPs

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query_string="page=legal-pages") AND NOT user_role="administrator"

🔗 References

📤 Share & Export