Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12177: CWE-321 Use of Hard-coded Cryptographic Key in codename065 Download Manager

0
Medium
VulnerabilityCVE-2025-12177cvecve-2025-12177cwe-321
Published: Sat Nov 08 2025 (11/08/2025, 03:27:45 UTC)
Source: CVE Database V5
Vendor/Project: codename065
Product: Download Manager

Description

The Download Manager plugin for WordPress is vulnerable to unauthorized access due to a hardcoded Cron key used in the deleteExpired() and clearTempDataCPCron() functions in all versions up to, and including, 3.3.30. This makes it possible for unauthenticated attackers to trigger these cron jobs leading to deletion of expired posts and clearing cache.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:17:08 UTC

Technical Analysis

CVE-2025-12177 is a vulnerability identified in the codename065 Download Manager plugin for WordPress, specifically in all versions up to and including 3.3.30. The core issue stems from the use of a hardcoded cryptographic key, classified under CWE-321, which is embedded within the plugin's code to protect certain cron job functions: deleteExpired() and clearTempDataCPCron(). These functions are responsible for deleting expired posts and clearing cached data, respectively. Because the key is hardcoded and not dynamically generated or securely stored, attackers can discover and reuse this key to invoke these cron jobs remotely without authentication. This unauthorized access allows attackers to trigger deletion of expired posts and cache clearing operations, potentially disrupting website content management and caching mechanisms. The vulnerability is remotely exploitable over the network without requiring any user interaction or privileges, making it easier for attackers to abuse. The CVSS v3.1 base score is 5.3, reflecting a medium severity rating primarily due to the impact on integrity (unauthorized deletion of data) without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability highlights the risks of embedding static cryptographic keys in software, which can be extracted and misused by attackers to bypass intended access controls.

Potential Impact

The primary impact of CVE-2025-12177 is on data integrity within affected WordPress sites using the codename065 Download Manager plugin. Unauthorized triggering of cron jobs can lead to the deletion of expired posts and clearing of cache data, which may disrupt website content availability and user experience. While this does not directly compromise confidentiality or availability, the unauthorized deletion of content can cause operational disruptions, loss of data integrity, and potential reputational damage for organizations relying on the plugin for content management. Attackers could exploit this vulnerability to manipulate site content or interfere with caching mechanisms, potentially affecting site performance and reliability. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of exploitation on exposed WordPress installations. Organizations with high volumes of time-sensitive or critical content may experience more severe operational impacts. Additionally, repeated exploitation could lead to increased administrative overhead to restore deleted content and cache states.

Mitigation Recommendations

To mitigate CVE-2025-12177, organizations should immediately update the codename065 Download Manager plugin to a version that removes the hardcoded cryptographic key or applies secure key management practices once such a patch is released. Until an official patch is available, administrators can implement the following specific mitigations: 1) Restrict access to the cron job endpoints by configuring web application firewalls (WAFs) or server-level access controls to allow only trusted IP addresses or authenticated users to invoke these functions. 2) Disable or remove the vulnerable cron job functions if they are not critical to site operations, or replace them with custom scripts that use secure, dynamically generated keys or authentication mechanisms. 3) Monitor web server logs and WordPress activity logs for unusual or repeated requests targeting the cron job URLs to detect potential exploitation attempts early. 4) Employ security plugins that can detect and block unauthorized access attempts to plugin endpoints. 5) Regularly back up WordPress content and database to enable quick restoration in case of unauthorized deletions. 6) Conduct code reviews and security audits on third-party plugins before deployment to identify hardcoded keys or other insecure practices. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary disabling of vulnerable functionality.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T15:57:21.778Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeaf3a8fd010ecf64233

Added to database: 11/8/2025, 3:53:19 AM

Last enriched: 2/27/2026, 8:17:08 PM

Last updated: 3/25/2026, 2:17:02 AM

Views: 237

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses