VYPR
Medium severity5.3NVD Advisory· Published Dec 15, 2025· Updated Apr 15, 2026

CVE-2025-13950

CVE-2025-13950

Description

The OneSignal – Web Push Notifications plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the settings handling functionality in all versions up to, and including, 3.6.1. This is due to the plugin processing POST requests without verifying user capabilities or nonces. This makes it possible for unauthenticated attackers to overwrite the OneSignal App ID, REST API key, and notification behavior via direct POST requests.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The OneSignal WordPress plugin up to 3.6.1 lacks capability and nonce checks on settings save, allowing unauthenticated attackers to overwrite critical configuration via direct POST requests.

Vulnerability

Overview

The OneSignal – Web Push Notifications plugin for WordPress, in all versions up to and including 3.6.1, contains a missing capability check in its settings handling functionality. The plugin processes POST requests to save configuration without verifying user capabilities or nonces, as shown in the code changes from the fix [1]. This means any unauthenticated visitor can trigger the settings update endpoint.

Exploitation

An attacker can exploit this by sending a direct POST request to the WordPress admin area where the plugin's settings are handled. The request can include parameters such as onesignal_app_id, onesignal_rest_api_key, and other notification behavior settings. No authentication or prior knowledge is required beyond the endpoint URL. The plugin's code prior to the fix did not check for current_user_can() or nonce validation, allowing the settings to be overwritten without any privilege check.

Impact

Successful exploitation allows an attacker to overwrite the OneSignal App ID and REST API key, effectively hijacking the push notification service for the site. This could enable the attacker to send arbitrary push notifications to all subscribed users, potentially containing malicious links or phishing content. Additionally, altering notification behavior could disrupt legitimate notifications or cause denial of service.

Mitigation

The vulnerability has been addressed in a subsequent release. The fix, visible in the referenced pull request [1], adds proper capability checks (e.g., current_user_can('manage_options')) and nonce verification to the settings save handler. Users are strongly advised to update to the latest version of the plugin to protect their sites.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.