Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12177: CWE-321 Use of Hard-coded Cryptographic Key in codename065 Download Manager

0
Medium
VulnerabilityCVE-2025-12177cvecve-2025-12177cwe-321
Published: Sat Nov 08 2025 (11/08/2025, 03:27:45 UTC)
Source: CVE Database V5
Vendor/Project: codename065
Product: Download Manager

Description

The Download Manager plugin for WordPress is vulnerable to unauthorized access due to a hardcoded Cron key used in the deleteExpired() and clearTempDataCPCron() functions in all versions up to, and including, 3.3.30. This makes it possible for unauthenticated attackers to trigger these cron jobs leading to deletion of expired posts and clearing cache.

AI-Powered Analysis

AILast updated: 11/08/2025, 04:01:26 UTC

Technical Analysis

CVE-2025-12177 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) found in the codename065 Download Manager plugin for WordPress. The issue arises from the presence of a hardcoded Cron key used to authenticate execution of two critical cron job functions: deleteExpired() and clearTempDataCPCron(). These functions are responsible for deleting expired posts and clearing temporary cache data, respectively. Because the key is hardcoded and publicly known or easily guessable, unauthenticated attackers can invoke these cron jobs remotely without any authentication or user interaction. This unauthorized triggering can lead to unintended deletion of content and cache clearing, impacting data integrity and potentially disrupting normal site operations. The vulnerability affects all versions up to and including 3.3.30 of the plugin. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to integrity. No patches or exploit code are currently publicly available, but the risk remains due to the ease of exploitation. The flaw is significant because it undermines the trustworthiness of content management on affected WordPress sites, which are widely used across various sectors.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of web content and cached data managed by the Download Manager plugin. Unauthorized deletion of expired posts could lead to loss of important archival content or disrupt workflows that depend on these posts. Clearing cache unexpectedly may degrade user experience or cause temporary service disruptions. While confidentiality and availability are not directly impacted, the integrity compromise can affect business operations, brand reputation, and user trust. Organizations in sectors such as e-commerce, media, education, and government that rely heavily on WordPress for content delivery are particularly vulnerable. The ease of exploitation without authentication increases the threat level, especially for publicly accessible websites. Although no known exploits are reported yet, the presence of a hardcoded key makes it a likely target for opportunistic attackers. European entities with compliance obligations around data integrity and operational continuity should prioritize addressing this vulnerability.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the vulnerable cron job endpoints by implementing web application firewall (WAF) rules that block unauthorized requests targeting the deleteExpired() and clearTempDataCPCron() functions. Network-level controls such as IP whitelisting or VPN access for cron job execution can reduce exposure. Administrators should monitor logs for unusual invocations of these cron jobs to detect potential exploitation attempts. Since no official patch is currently available, consider disabling or removing the Download Manager plugin temporarily if feasible. Alternatively, custom code modifications to remove or replace the hardcoded key with a securely generated, configurable secret can mitigate the risk. Regularly update WordPress and all plugins once a vendor patch is released. Additionally, implement routine backups of website content and cache data to enable recovery from unauthorized deletions. Educate site administrators about this vulnerability and encourage vigilance in monitoring site integrity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T15:57:21.778Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeaf3a8fd010ecf64233

Added to database: 11/8/2025, 3:53:19 AM

Last enriched: 11/8/2025, 4:01:26 AM

Last updated: 11/8/2025, 5:14:25 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats