
Cloud Vulnerability DB
A community-led vulnerabilities database
The WordPress Team Manager Plugin (versions <= 2.3.16) was identified with a Missing Authorization vulnerability, assigned CVE-2025-58222. The vulnerability was discovered by Nabil Irawan from Heroes Cyber and was publicly disclosed on September 22, 2025, with the last update on September 26, 2025. This security issue affects the authorization mechanisms within the WordPress plugin (Wordfence Intel, Patchstack Database).
The vulnerability is classified as a Broken Access Control issue with a CVSS score of 5.3 (Low severity). The security flaw stems from missing authorization, authentication, or nonce token checks in certain functions, potentially allowing unprivileged users to execute higher privileged actions. The vulnerability was initially reported on July 30, 2025, and an early warning was distributed to Patchstack customers on September 22, 2025 (Patchstack Database).
The vulnerability has been assessed to have a low severity impact and is considered unlikely to be exploited. As a Broken Access Control vulnerability, it could potentially allow unauthorized users to perform actions beyond their intended privilege level (Patchstack Database).
As of the latest reports, no official fix is available for this vulnerability. The issue has been classified as low priority, with Patchstack indicating that a virtual patch is unnecessary given the low severity impact (Patchstack Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."