CVE-2025-68589

HIGH
2025-12-24 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Dec 24, 2025 - 13:16 nvd
HIGH 8.1

Description

Missing Authorization vulnerability in WP Socio WP Telegram Widget and Join Link wptelegram-widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Telegram Widget and Join Link: from n/a through <= 2.2.12.

Analysis

Broken access control in WP Telegram Widget and Join Link plugin versions up to 2.2.12 allows authenticated users with low privileges to bypass authorization checks and access high-sensitivity configuration or data. The vulnerability enables unauthorized read and write operations (CVSS C:H/I:H) without requiring user interaction. EPSS score of 0.04% suggests low observed exploitation probability, and no public exploit code or active exploitation (CISA KEV) has been identified at time of analysis.

Technical Context

This vulnerability stems from CWE-862 (Missing Authorization), a fundamental access control flaw where the WordPress plugin fails to properly verify user permissions before granting access to sensitive functions or data. The WP Telegram Widget and Join Link plugin integrates Telegram messaging features into WordPress sites, likely exposing widget configuration, join links, or channel management functionality. The missing authorization check allows any authenticated user-regardless of their WordPress role-to perform actions that should be restricted to administrators or specific privileged roles. This represents a horizontal or vertical privilege escalation vulnerability within the WordPress plugin ecosystem, where authentication (proving identity) exists but authorization (validating permissions) is improperly implemented or entirely absent.

Affected Products

WordPress plugin WP Telegram Widget and Join Link versions from earliest release through 2.2.12 are confirmed vulnerable. The plugin, developed by WP Socio, provides Telegram channel integration and join link widgets for WordPress sites. All installations running version 2.2.12 or earlier contain the missing authorization vulnerability. The Patchstack advisory references version 2.2.11 specifically in the URL but the CVE description confirms the issue persists through version 2.2.12. Site administrators running any version in this range should consider all authenticated users as potential threat actors for widget configuration manipulation. The vulnerability affects standard WordPress installations where the plugin is active, regardless of hosting environment or server configuration.

Remediation

Upgrade WP Telegram Widget and Join Link plugin to version 2.2.13 or later if available, as the CVE acknowledgment implies a fix version exists beyond 2.2.12. Access the WordPress admin dashboard, navigate to Plugins, and check for updates to wptelegram-widget. If no patched version appears available through the WordPress repository, temporarily deactivate the plugin until vendor confirmation of the fix. Review the Patchstack vulnerability database entry at https://patchstack.com/database/Wordpress/Plugin/wptelegram-widget/vulnerability/wordpress-wp-telegram-widget-and-join-link-plugin-2-2-11-broken-access-control-vulnerability for vendor-specific guidance and confirmed patch availability. As a temporary mitigation, restrict WordPress user registration or limit authenticated user accounts to trusted individuals only, and audit existing low-privilege accounts for suspicious activity. Implement WordPress security plugins with access control monitoring to detect unauthorized configuration changes.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: 0

Share

CVE-2025-68589 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy