VYPR
Medium severity4.3NVD Advisory· Published Oct 29, 2025· Updated Apr 15, 2026

CVE-2025-11587

CVE-2025-11587

Description

The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing capability check in Call Now Button plugin (≤1.5.3) allows authenticated subscribers to force-bind the plugin to an attacker-controlled cloud account, enabling malicious button injection.

The Call Now Button plugin for WordPress (versions up to and including 1.5.3) contains a missing capability check in the activate function, which is accessible via the wp-admin/admin-post.php?action=cnb_apikey_activate endpoint. This endpoint, responsible for linking the plugin to a cloud account on nowbuttons.com, fails to verify that the requesting user has sufficient privileges (e.g., Administrator) and also lacks a nonce check, making it vulnerable to both unauthorized access and cross-site request forgery (CSRF) [1].

An authenticated attacker with as little as Subscriber-level access can exploit this vulnerability on a fresh plugin installation that has not yet been configured with an API key. By crafting a request containing a one-time token (OTT), the attacker can force the plugin to bind to their own cloud account. Because the endpoint stores the token directly into the plugin's persistent options without proper validation, the attacker gains full control over the plugin's configuration [1].

Once the plugin is bound to the attacker's cloud account, the attacker can remotely control the on-site overlay (e.g., call/chat buttons) and inject malicious buttons or content. This can lead to phishing attacks, redirection to malicious sites, or other harmful actions, as user interactions are funneled to the attacker's cloud project [1].

The vulnerability is partially mitigated by the requirement that the plugin must be on a fresh install with no pre-configured API key. The vendor has not yet released a patched version as of the publication date. Users are advised to ensure that the plugin is configured with a legitimate API key immediately after installation, and to restrict access to admin accounts. The CleanTalk research includes a proof of concept, but no active exploit has been reported [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.