Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System

0
Medium
VulnerabilityCVE-2025-12877cvecve-2025-12877cwe-862
Published: Sat Nov 22 2025 (11/22/2025, 07:29:20 UTC)
Source: CVE Database V5
Vendor/Project: themeatelier
Product: IDonate – Blood Donation, Request And Donor Management System

Description

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:16:11 UTC

Technical Analysis

CVE-2025-12877 is a vulnerability identified in the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, developed by themeatelier. The issue stems from a missing authorization (capability) check in the panding_blood_request_action() function, which is responsible for handling blood request actions. Because this function does not verify whether the user has the appropriate permissions, unauthenticated attackers can invoke it to delete arbitrary posts on the affected WordPress site. This vulnerability affects all versions of the plugin up to and including 2.1.15. The lack of authentication and user interaction requirements makes exploitation straightforward, as attackers can send crafted requests directly to the vulnerable endpoint. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. While the impact is limited to integrity (unauthorized deletion of posts), it does not affect confidentiality or availability directly. The CVSS v3.1 base score is 5.3, reflecting medium severity with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are currently reported, but the vulnerability represents a risk to any WordPress site using this plugin, especially those managing critical or sensitive data related to blood donation and donor management.

Potential Impact

The primary impact of CVE-2025-12877 is unauthorized modification of data integrity through deletion of arbitrary posts on WordPress sites using the vulnerable IDonate plugin. This can disrupt the management of blood donation requests and donor information, potentially causing operational issues for organizations relying on this system. Although confidentiality and availability are not directly affected, the loss or tampering of data can undermine trust, cause administrative overhead to restore data, and potentially impact patient care coordination or donor management workflows. Organizations running this plugin on public-facing WordPress sites are at risk of remote exploitation without authentication, increasing the attack surface. The vulnerability could be leveraged by attackers to deface sites, remove critical donation requests, or sabotage donor records, which may have reputational and functional consequences. Given the plugin’s niche use in healthcare-related contexts, the impact may be more severe for organizations where data integrity is critical for compliance and operational continuity.

Mitigation Recommendations

To mitigate CVE-2025-12877, organizations should immediately update the IDonate plugin to a version that includes proper authorization checks once available from the vendor. In the absence of an official patch, administrators should implement compensating controls such as restricting access to the vulnerable function via web application firewall (WAF) rules that block unauthorized requests targeting the panding_blood_request_action() endpoint. Additionally, review and tighten WordPress user roles and permissions to minimize exposure. Monitoring web server logs for suspicious requests attempting to invoke this function can help detect exploitation attempts. Regular backups of WordPress content and database are critical to enable recovery from unauthorized deletions. Organizations should also consider isolating or segmenting the WordPress environment to limit the blast radius of potential attacks. Finally, maintain awareness of vendor advisories and apply patches promptly when released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T15:39:01.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69216996633f6b6b24ab4788

Added to database: 11/22/2025, 7:43:18 AM

Last enriched: 2/27/2026, 9:16:11 PM

Last updated: 3/24/2026, 2:55:06 PM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses