VYPR
Medium severity4.3NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-62996

CVE-2025-62996

Description

Missing Authorization vulnerability in Code Amp Custom Layouts – Post + Product grids made easy custom-layouts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Custom Layouts – Post + Product grids made easy: from n/a through <= 1.4.12.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Custom Layouts plugin for WordPress <=1.4.12 has a missing authorization vulnerability allowing low-privilege users to perform unauthorized actions.

Vulnerability

Overview

The Custom Layouts – Post + Product grids made easy plugin for WordPress contains a missing authorization vulnerability in versions up to and including 1.4.12 [1]. This flaw arises from incorrectly configured access control security levels, allowing functions to be executed without proper permission checks. As a result, an attacker with minimal privileges can exploit this broken access control to perform actions reserved for higher-privileged users [1].

Exploitation

Details

Exploitation requires an authenticated user account with low-level access, such as a subscriber or contributor. No special network position is needed beyond standard WordPress access. The attack vector is through WordPress admin-ajax or similar endpoints that lack nonce or capability checks. The vulnerability is considered low severity but is reportedly used in mass-exploit campaigns targeting thousands of websites [1].

Impact

Successful exploitation allows an unprivileged user to modify custom layouts, insert malicious content, or perform other unauthorized actions within the plugin’s context. This could lead to site defacement, data tampering, or further privilege escalation depending on the plugin’s capabilities [1].

Mitigation

The vendor has released version 1.5.0 which resolves the vulnerability by implementing proper authorization checks. Users are strongly advised to update immediately. For those unable to update, applying a Web Application Firewall (WAF) rule or contacting hosting providers for assistance is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.