CVE-2025-11154: CWE-862 Missing Authorization in IDonate
The IDonate WordPress plugin before 2.1.13 does not have authorisation and CSRF when deleting users via an action handler, allowing unauthenticated attackers to delete arbitrary users.
AI Analysis
Technical Summary
CVE-2025-11154 identifies a critical security vulnerability in the IDonate WordPress plugin prior to version 2.1.13. The flaw arises from missing authorization checks (CWE-862) combined with the absence of Cross-Site Request Forgery (CSRF) protections (CWE-352) on the plugin's user deletion action handler. This means that an unauthenticated attacker can craft a request that triggers the deletion of arbitrary user accounts without any authentication or user interaction. The vulnerability affects all versions before 2.1.13, with no patch links currently available, indicating that a fix is either pending or recently released but not linked. The plugin is commonly used for managing donations on WordPress sites, often by nonprofits and organizations relying on user accounts for managing donors or administrators. The lack of authorization and CSRF protections allows attackers to disrupt site operations by removing users, potentially including administrators, which can lead to denial of service or loss of control over the site. Although no known exploits have been reported in the wild, the vulnerability's nature makes it highly exploitable. The absence of a CVSS score necessitates a severity assessment based on impact and exploitability factors. The vulnerability impacts confidentiality minimally but severely affects integrity and availability by enabling unauthorized user deletions. Exploitation requires no authentication or user interaction, broadening the attack surface significantly. The scope includes all WordPress sites using the vulnerable IDonate plugin versions. This vulnerability underscores the importance of strict authorization and CSRF protections on sensitive actions within web applications.
Potential Impact
For European organizations, especially those operating nonprofit, charity, or donation platforms on WordPress using the IDonate plugin, this vulnerability poses a significant threat. Attackers can delete arbitrary user accounts, including administrators, potentially causing operational disruptions, loss of administrative control, and denial of service. This could lead to downtime, loss of donor trust, and financial impact due to interrupted donation processing. The integrity of user data and site management is compromised, and recovery may require manual restoration of user accounts and investigation of unauthorized deletions. Given the plugin's role in donation management, the impact extends to reputational damage and potential regulatory scrutiny under data protection laws if user management is affected. The lack of authentication and CSRF protections increases the risk of automated or widespread exploitation attempts, especially targeting high-profile or high-traffic sites. Organizations with limited WordPress security expertise may be particularly vulnerable to exploitation and subsequent operational impact.
Mitigation Recommendations
Immediate mitigation involves upgrading the IDonate plugin to version 2.1.13 or later once it becomes available, as this version is expected to include proper authorization and CSRF protections. Until an update is applied, organizations should implement web application firewall (WAF) rules to block unauthorized requests targeting the user deletion action handler. Restrict access to the WordPress admin and plugin endpoints via IP whitelisting or VPN access where feasible. Conduct a thorough audit of user accounts to detect any unauthorized deletions and maintain regular backups to enable rapid recovery. Implement monitoring and alerting for unusual user deletion activities or access patterns. Additionally, review and harden WordPress security configurations, including enforcing strong authentication for administrative users and enabling multi-factor authentication (MFA). Educate site administrators about the risks of CSRF and missing authorization vulnerabilities and the importance of timely plugin updates. Engage with the plugin vendor or community to track patch releases and security advisories.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-11154: CWE-862 Missing Authorization in IDonate
Description
The IDonate WordPress plugin before 2.1.13 does not have authorisation and CSRF when deleting users via an action handler, allowing unauthenticated attackers to delete arbitrary users.
AI-Powered Analysis
Technical Analysis
CVE-2025-11154 identifies a critical security vulnerability in the IDonate WordPress plugin prior to version 2.1.13. The flaw arises from missing authorization checks (CWE-862) combined with the absence of Cross-Site Request Forgery (CSRF) protections (CWE-352) on the plugin's user deletion action handler. This means that an unauthenticated attacker can craft a request that triggers the deletion of arbitrary user accounts without any authentication or user interaction. The vulnerability affects all versions before 2.1.13, with no patch links currently available, indicating that a fix is either pending or recently released but not linked. The plugin is commonly used for managing donations on WordPress sites, often by nonprofits and organizations relying on user accounts for managing donors or administrators. The lack of authorization and CSRF protections allows attackers to disrupt site operations by removing users, potentially including administrators, which can lead to denial of service or loss of control over the site. Although no known exploits have been reported in the wild, the vulnerability's nature makes it highly exploitable. The absence of a CVSS score necessitates a severity assessment based on impact and exploitability factors. The vulnerability impacts confidentiality minimally but severely affects integrity and availability by enabling unauthorized user deletions. Exploitation requires no authentication or user interaction, broadening the attack surface significantly. The scope includes all WordPress sites using the vulnerable IDonate plugin versions. This vulnerability underscores the importance of strict authorization and CSRF protections on sensitive actions within web applications.
Potential Impact
For European organizations, especially those operating nonprofit, charity, or donation platforms on WordPress using the IDonate plugin, this vulnerability poses a significant threat. Attackers can delete arbitrary user accounts, including administrators, potentially causing operational disruptions, loss of administrative control, and denial of service. This could lead to downtime, loss of donor trust, and financial impact due to interrupted donation processing. The integrity of user data and site management is compromised, and recovery may require manual restoration of user accounts and investigation of unauthorized deletions. Given the plugin's role in donation management, the impact extends to reputational damage and potential regulatory scrutiny under data protection laws if user management is affected. The lack of authentication and CSRF protections increases the risk of automated or widespread exploitation attempts, especially targeting high-profile or high-traffic sites. Organizations with limited WordPress security expertise may be particularly vulnerable to exploitation and subsequent operational impact.
Mitigation Recommendations
Immediate mitigation involves upgrading the IDonate plugin to version 2.1.13 or later once it becomes available, as this version is expected to include proper authorization and CSRF protections. Until an update is applied, organizations should implement web application firewall (WAF) rules to block unauthorized requests targeting the user deletion action handler. Restrict access to the WordPress admin and plugin endpoints via IP whitelisting or VPN access where feasible. Conduct a thorough audit of user accounts to detect any unauthorized deletions and maintain regular backups to enable rapid recovery. Implement monitoring and alerting for unusual user deletion activities or access patterns. Additionally, review and harden WordPress security configurations, including enforcing strong authentication for administrative users and enabling multi-factor authentication (MFA). Educate site administrators about the risks of CSRF and missing authorization vulnerabilities and the importance of timely plugin updates. Engage with the plugin vendor or community to track patch releases and security advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-29T13:45:16.966Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ff0bad4c2556d99606b1ce
Added to database: 10/27/2025, 6:05:33 AM
Last enriched: 10/27/2025, 6:21:01 AM
Last updated: 10/27/2025, 8:29:14 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12249: CSV Injection in Axosoft Scrum and Bug Tracking
MediumCVE-2025-12248: SQL Injection in CLTPHP
MediumCVE-2025-12247: Unquoted Search Path in Hasleo Backup Suite
HighCVE-2025-12243: SQL Injection in code-projects Client Details System
MediumCVE-2025-12242: SQL Injection in CodeAstro Gym Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.