CSS3 Tooltips for WordPress Vulnerability (Medium) – CVE-2025-32180

CSS3 Tooltips for WordPress Vulnerability (Medium) – CVE-2025-32180

by | Feb 25, 2026 | Plugins

Medium severity access-control issue affecting the CSS3 Tooltips for WordPress plugin (slug: css3_tooltips) has been disclosed as CVE-2025-32180. In versions 1.8 and below, a missing authorization (capability) check can allow an authenticated user with Subscriber-level access or higher to perform an unauthorized action (CVSS 4.3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

Attack Vectors

The primary attack vector is remote, authenticated access: an attacker must be able to log in to your WordPress site (even with a low-privilege account such as a Subscriber). This can occur through normal account creation flows, compromised credentials, password reuse, or a previously breached user database.

Because the vulnerability does not require user interaction (UI:N), the risk increases on sites that allow registrations, run membership programs, offer gated downloads, or maintain large lists of customer/community logins—common scenarios for marketing-led sites.

Security Weakness

CVE-2025-32180 is caused by a missing capability check in a plugin function in CSS3 Tooltips for WordPress up to version 1.8. In practical terms, the plugin does not sufficiently verify whether the logged-in user should be allowed to execute a sensitive action.

This is a classic broken access control scenario: WordPress roles exist to limit what different users can do, but a plugin must explicitly enforce those limits. When it doesn’t, even low-privilege accounts may be able to trigger actions intended only for admins or editors.

Remediation: update the plugin to version 1.9 or a newer patched version. Reference: Wordfence vulnerability advisory.

Technical or Business Impacts

While this vulnerability is rated Medium, it can still create meaningful business risk because it enables unauthorized actions by authenticated users. Even limited, unauthorized changes can disrupt marketing operations and governance—especially on sites where many users have accounts.

Potential business impacts include: (1) brand and content integrity risk if unauthorized users can alter site behavior or presentation in ways that confuse customers, (2) campaign performance and attribution risk if site elements are changed unexpectedly during active campaigns, and (3) compliance and audit concerns if internal controls assume role-based restrictions that are not actually enforced by the plugin.

Similar attacks (real-world examples of improper authorization): CVE-2023-22515 (Atlassian Confluence improper authorization) and CVE-2023-22518 (Atlassian Confluence improper authorization) highlight how broken access control issues can quickly become high-impact when attackers can leverage low barriers to perform actions they shouldn’t be able to.

If your organization relies on user registrations (events, communities, partner portals, customer-only resources), treat this as a priority patch: update to CSS3 Tooltips for WordPress 1.9+, review who has active accounts, and ensure least-privilege role assignments align with your compliance expectations.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers