VYPR
Medium severity4.3NVD Advisory· Published Dec 9, 2025· Updated Apr 23, 2026

CVE-2025-62993

CVE-2025-62993

Description

Missing Authorization vulnerability in rainafarai Notification for Telegram notification-for-telegram allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Notification for Telegram: from n/a through <= 3.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing authorization vulnerability in Notification for Telegram plugin (<=3.5.1) allows unprivileged users to exploit incorrectly configured access controls.

Root

Cause

The vulnerability is a missing authorization (broken access control) issue in the WordPress plugin Notification for Telegram versions from n/a through 3.5.1. The plugin fails to properly enforce access control security levels, allowing exploitation by unprivileged users. This is a classic case of missing capability or nonce token checks in plugin functions [1].

Exploitation

Attackers can exploit this vulnerability without requiring higher-level privileges, as the flawed access control permits lower-privileged users (e.g., subscribers) to execute actions intended for administrators or editors. No specific authentication bypass is needed beyond the user's existing session — the bug lies in the absence of authorization checks, not in authentication [1].

Impact

Successful exploitation enables an attacker to perform unauthorized actions within the WordPress installation, potentially compromising the site's security. The vulnerability has a CVSS v3 score of 4.3 (Medium), with a low severity impact but notes that similar flaws are frequently used in mass-exploit campaigns targeting thousands of sites [1].

Mitigation

The vulnerability has been patched in version 3.5.2 of the plugin. Users are strongly advised to update to the latest version immediately. If unable to update, contacting a hosting provider or web developer is recommended. Patchstack users can enable auto-updates for vulnerable plugins as an additional precaution [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.