The Userback plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the userback_get_json function in all versions up to, and including, 1.0.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract plugin's configuration data including the Userback API access token and site's posts/pages contents, including those that have private and draft status.
History

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Userback plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the userback_get_json function in all versions up to, and including, 1.0.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract plugin's configuration data including the Userback API access token and site's posts/pages contents, including those that have private and draft status.
Title Userback <= 1.0.15 - Missing Authorization to Authenticated (Subscriber+) Plugin's Configuration Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-12-13T04:31:22.143Z

Updated: 2025-12-13T04:31:22.143Z

Reserved: 2025-12-11T12:12:04.086Z

Link: CVE-2025-14540

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-13T16:16:51.260

Modified: 2025-12-13T16:16:51.260

Link: CVE-2025-14540

cve-icon Redhat

No data.