The AL Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the check_activate_permission() permission callback for the /wp-json/presslearn/v1/activate REST API endpoint in all versions up to, and including, 1.0.2. The callback reads the client-supplied Origin header and, after parsing, allows the request if it matches one of the trusted domains, without ever verifying user authentication, capabilities, or nonce tokens. This makes it possible for unauthenticated attackers to activate premium features by simply spoofing the Origin header.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Loword
Loword al Pack Wordpress Wordpress wordpress |
|
Vendors & Products |
Loword
Loword al Pack Wordpress Wordpress wordpress |
Mon, 18 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 16 Aug 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The AL Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the check_activate_permission() permission callback for the /wp-json/presslearn/v1/activate REST API endpoint in all versions up to, and including, 1.0.2. The callback reads the client-supplied Origin header and, after parsing, allows the request if it matches one of the trusted domains, without ever verifying user authentication, capabilities, or nonce tokens. This makes it possible for unauthenticated attackers to activate premium features by simply spoofing the Origin header. | |
Title | Al Pack <= 1.0.2 - Missing Authorization to Unauthenticated Premium Feature Activation via check_activate_permission Function | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-16T03:38:50.580Z
Updated: 2025-08-18T18:59:55.536Z
Reserved: 2025-07-14T21:30:46.374Z
Link: CVE-2025-7664

Updated: 2025-08-18T13:36:36.808Z

Status : Awaiting Analysis
Published: 2025-08-16T04:16:06.283
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-7664

No data.