CVE-2025-0951
Description
Multiple plugins and/or themes for WordPress by LiquidThemes are vulnerable to unauthorized access due to a missing capability check on the liquid_reset_wordpress_before AJAX in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to deactivate all of a site's plugins. While we escalated this to Envato after not being able to establish contact, it appears the developer added a nonce check, however that is not sufficient protection as the nonce is exposed to all users with access to the dashboard.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WordPress LiquidThemes plugins/themes allow authenticated attackers to deactivate all plugins due to insufficient capability and nonce checks.
Root
Cause
The vulnerability resides in the liquid_reset_wordpress_before AJAX action implemented in multiple plugins and themes by LiquidThemes. The core issue is a missing capability check, which permits any authenticated user—regardless of their role—to trigger the action. Although the developer attempted to mitigate the problem by adding a nonce, that nonce is exposed to all users who can access the WordPress dashboard, rendering it ineffective as an authorization barrier [1].
Exploitation
An attacker needs only a valid account with Subscriber-level access or higher to exploit this flaw. Since Subscriber is the default role for new users on many WordPress sites, the attack surface is broad. The attacker can craft a request to the AJAX endpoint, supplying the exposed nonce, and invoke the function that deactivates all installed plugins on the target site. No additional privileges are required beyond the authenticated session.
Impact
Successful exploitation results in the immediate deactivation of every active plugin on the WordPress site. This can cause complete loss of site functionality, remove security plugins, and potentially expose the site to other vulnerabilities or make the front-end inaccessible if the theme relies on plugin features. The attacker does not delete data, but the disruption can be severe and require manual recovery by an administrator.
Mitigation
At the time of publication (2025-08-28), a complete, secure patch has not been confirmed. The vendor added a nonce check, but as noted, that does not prevent exploitation because the nonce is accessible to all dashboard users. Users are advised to restrict Subscriber accounts to trusted individuals only and to monitor for updates from LiquidThemes or Envato that address the authorization gap properly.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.