VYPR
Medium severity6.5NVD Advisory· Published Nov 21, 2025· Updated Apr 15, 2026

CVE-2025-66079

CVE-2025-66079

Description

Missing Authorization vulnerability in Jegstudio Gutenverse Form gutenverse-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gutenverse Form: from n/a through <= 2.2.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Gutenverse Form plugin for WordPress ≤2.2.0 has a missing authorization vulnerability allowing unauthenticated attackers to exploit access control flaws.

Vulnerability

Overview The Gutenverse Form plugin for WordPress, developed by Jegstudio, contains a missing authorization vulnerability in versions up to and including 2.2.0. This flaw is classified as a Broken Access Control issue, meaning the plugin fails to properly verify user permissions or nonce tokens before executing certain functions, allowing unauthenticated or low-privileged users to perform actions intended for higher-privileged roles [1].

Exploitation

Prerequisites No special authentication or network position is required; an attacker can exploit this vulnerability remotely without any prerequisites. The broken access control mechanism can be triggered by sending crafted requests to the plugin's endpoints, effectively bypassing security checks that should restrict functionality to authorized users [1].

Impact

Successful exploitation could allow an attacker to perform actions reserved for administrators, such as altering form configurations, accessing sensitive data, or executing other unintended operations. This vulnerability is particularly concerning as it may be used in mass-exploit campaigns targeting thousands of WordPress sites, regardless of their popularity or traffic [1].

Mitigation

Status The vendor has released version 2.3.0, which patches the authorization flaw. Users are strongly advised to update immediately. If updating is not possible, consult with a hosting provider or web developer for temporary mitigations. Patchstack users can enable auto-updates to protect affected plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.