VYPR
Medium severity5.3NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-48166

CVE-2025-48166

Description

Missing Authorization vulnerability in sminozzi Stop and Block bots plugin Anti bots antibots allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Stop and Block bots plugin Anti bots: from n/a through <= 1.48.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Stop and Block Bots (Anti Bots) plugin for WordPress up to version 1.48 has a missing authorization vulnerability, allowing unauthenticated access to restricted functionality.

Vulnerability

Overview

The Stop and Block Bots (Anti Bots) WordPress plugin, versions 1.48 and earlier, suffers from a missing authorization vulnerability [1]. The plugin fails to properly enforce access control checks on certain functions, meaning that functionality that should require higher privileges is accessible without proper authentication [1]. This is categorized as a Broken Access Control issue, which can allow unprivileged users to execute actions intended for privileged roles.

Attack

Vector and Exploitation

Exploitation requires no authentication, as the vulnerability stems from an absent authorization or nonce check in a function [1]. The attack surface is the WordPress admin area or AJAX endpoints exposed by the plugin. An attacker can trigger the vulnerable functionality remotely by sending crafted requests. The CVSSv3 score is 5.3 (Medium), indicating low attack complexity and network access [1].

Impact

Successful exploitation could allow an attacker to access or execute functionality that is not properly constrained by ACLs, potentially leading to unauthorized changes to plugin settings, site configuration, or other privileged actions [1]. While the severity is rated low, such vulnerabilities are known to be used in mass-exploit campaigns targeting thousands of sites [1].

Mitigation

The vendor has released version 1.50 which resolves the vulnerability [1]. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins [1]. For those unable to update, seeking assistance from a hosting provider or web developer is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.