CVE-2025-12177: CWE-321 Use of Hard-coded Cryptographic Key in codename065 Download Manager
The Download Manager plugin for WordPress is vulnerable to unauthorized access due to a hardcoded Cron key used in the deleteExpired() and clearTempDataCPCron() functions in all versions up to, and including, 3.3.30. This makes it possible for unauthenticated attackers to trigger these cron jobs leading to deletion of expired posts and clearing cache.
AI Analysis
Technical Summary
CVE-2025-12177 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) found in the codename065 Download Manager plugin for WordPress. The issue arises from the presence of a hardcoded Cron key used to authenticate execution of two critical cron job functions: deleteExpired() and clearTempDataCPCron(). These functions are responsible for deleting expired posts and clearing temporary cache data, respectively. Because the key is hardcoded and publicly known or easily guessable, unauthenticated attackers can invoke these cron jobs remotely without any authentication or user interaction. This unauthorized triggering can lead to unintended deletion of content and cache clearing, impacting data integrity and potentially disrupting normal site operations. The vulnerability affects all versions up to and including 3.3.30 of the plugin. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to integrity. No patches or exploit code are currently publicly available, but the risk remains due to the ease of exploitation. The flaw is significant because it undermines the trustworthiness of content management on affected WordPress sites, which are widely used across various sectors.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of web content and cached data managed by the Download Manager plugin. Unauthorized deletion of expired posts could lead to loss of important archival content or disrupt workflows that depend on these posts. Clearing cache unexpectedly may degrade user experience or cause temporary service disruptions. While confidentiality and availability are not directly impacted, the integrity compromise can affect business operations, brand reputation, and user trust. Organizations in sectors such as e-commerce, media, education, and government that rely heavily on WordPress for content delivery are particularly vulnerable. The ease of exploitation without authentication increases the threat level, especially for publicly accessible websites. Although no known exploits are reported yet, the presence of a hardcoded key makes it a likely target for opportunistic attackers. European entities with compliance obligations around data integrity and operational continuity should prioritize addressing this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable cron job endpoints by implementing web application firewall (WAF) rules that block unauthorized requests targeting the deleteExpired() and clearTempDataCPCron() functions. Network-level controls such as IP whitelisting or VPN access for cron job execution can reduce exposure. Administrators should monitor logs for unusual invocations of these cron jobs to detect potential exploitation attempts. Since no official patch is currently available, consider disabling or removing the Download Manager plugin temporarily if feasible. Alternatively, custom code modifications to remove or replace the hardcoded key with a securely generated, configurable secret can mitigate the risk. Regularly update WordPress and all plugins once a vendor patch is released. Additionally, implement routine backups of website content and cache data to enable recovery from unauthorized deletions. Educate site administrators about this vulnerability and encourage vigilance in monitoring site integrity.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12177: CWE-321 Use of Hard-coded Cryptographic Key in codename065 Download Manager
Description
The Download Manager plugin for WordPress is vulnerable to unauthorized access due to a hardcoded Cron key used in the deleteExpired() and clearTempDataCPCron() functions in all versions up to, and including, 3.3.30. This makes it possible for unauthenticated attackers to trigger these cron jobs leading to deletion of expired posts and clearing cache.
AI-Powered Analysis
Technical Analysis
CVE-2025-12177 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) found in the codename065 Download Manager plugin for WordPress. The issue arises from the presence of a hardcoded Cron key used to authenticate execution of two critical cron job functions: deleteExpired() and clearTempDataCPCron(). These functions are responsible for deleting expired posts and clearing temporary cache data, respectively. Because the key is hardcoded and publicly known or easily guessable, unauthenticated attackers can invoke these cron jobs remotely without any authentication or user interaction. This unauthorized triggering can lead to unintended deletion of content and cache clearing, impacting data integrity and potentially disrupting normal site operations. The vulnerability affects all versions up to and including 3.3.30 of the plugin. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to integrity. No patches or exploit code are currently publicly available, but the risk remains due to the ease of exploitation. The flaw is significant because it undermines the trustworthiness of content management on affected WordPress sites, which are widely used across various sectors.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of web content and cached data managed by the Download Manager plugin. Unauthorized deletion of expired posts could lead to loss of important archival content or disrupt workflows that depend on these posts. Clearing cache unexpectedly may degrade user experience or cause temporary service disruptions. While confidentiality and availability are not directly impacted, the integrity compromise can affect business operations, brand reputation, and user trust. Organizations in sectors such as e-commerce, media, education, and government that rely heavily on WordPress for content delivery are particularly vulnerable. The ease of exploitation without authentication increases the threat level, especially for publicly accessible websites. Although no known exploits are reported yet, the presence of a hardcoded key makes it a likely target for opportunistic attackers. European entities with compliance obligations around data integrity and operational continuity should prioritize addressing this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable cron job endpoints by implementing web application firewall (WAF) rules that block unauthorized requests targeting the deleteExpired() and clearTempDataCPCron() functions. Network-level controls such as IP whitelisting or VPN access for cron job execution can reduce exposure. Administrators should monitor logs for unusual invocations of these cron jobs to detect potential exploitation attempts. Since no official patch is currently available, consider disabling or removing the Download Manager plugin temporarily if feasible. Alternatively, custom code modifications to remove or replace the hardcoded key with a securely generated, configurable secret can mitigate the risk. Regularly update WordPress and all plugins once a vendor patch is released. Additionally, implement routine backups of website content and cache data to enable recovery from unauthorized deletions. Educate site administrators about this vulnerability and encourage vigilance in monitoring site integrity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T15:57:21.778Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690ebeaf3a8fd010ecf64233
Added to database: 11/8/2025, 3:53:19 AM
Last enriched: 11/8/2025, 4:01:26 AM
Last updated: 11/8/2025, 5:14:25 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7663: CWE-862 Missing Authorization in ovatheme Ovatheme Events Manager
MediumCVE-2025-12353: CWE-639 Authorization Bypass Through User-Controlled Key in getwpfunnels Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels
MediumCVE-2025-12193: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kitae-park Mang Board WP
MediumCVE-2025-12167: CWE-862 Missing Authorization in rnzo Contact Form 7 AWeber Extension
MediumCVE-2025-12161: CWE-434 Unrestricted Upload of File with Dangerous Type in burhandodhy Smart Auto Upload Images – Import External Images
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.