VYPR
Medium severity5.4NVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-66163

CVE-2025-66163

Description

Missing Authorization vulnerability in merkulove Masker for Elementor masker-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Masker for Elementor: from n/a through <= 1.1.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Masker for Elementor (≤1.1.4) allows unauthenticated users to exploit incorrectly configured access controls.

Vulnerability

Overview

The CVE-2025-66163 vulnerability affects the Masker for Elementor plugin for WordPress, specifically versions from n/a through 1.1.4. It is a missing authorization issue, classified as a Broken Access Control vulnerability [1]. This means that certain functions within the plugin lack proper authorization checks, nonce tokens, or authentication requirements, allowing access to functionality that should be restricted to higher-privileged users.

Exploitation

Attackers can exploit this vulnerability remotely without requiring authentication or any special privileges. The missing authorization checks can be triggered by unprivileged users, potentially including unauthenticated visitors, depending on the specific vulnerable endpoint. The attack surface is the WordPress admin dashboard and plugin functionality exposed via the web interface.

Impact

Successful exploitation allows an attacker to perform actions that should require higher privileges, such as modifying plugin settings or accessing protected data. This could lead to partial compromise of the site's configuration or content. The vulnerability is rated Medium severity with a CVSS v3 score of 5.4, and patchstack notes that similar vulnerabilities are often used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

The vendor has not released a patched version; users must update to a version beyond 1.1.4 if available, or apply the recommendations from the advisory: update the plugin immediately or contact a web developer for assistance [1]. No workaround is documented, so the primary mitigation is to disable or replace the plugin if an update is not available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.