CVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.
AI Analysis
Technical Summary
CVE-2025-12877 is a vulnerability identified in the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, developed by themeatelier. The issue stems from a missing authorization (capability) check in the panding_blood_request_action() function, which is responsible for handling blood request actions. Because this function does not verify whether the user has the appropriate permissions, unauthenticated attackers can invoke it to delete arbitrary posts on the affected WordPress site. This vulnerability affects all versions of the plugin up to and including 2.1.15. The lack of authentication and user interaction requirements makes exploitation straightforward, as attackers can send crafted requests directly to the vulnerable endpoint. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. While the impact is limited to integrity (unauthorized deletion of posts), it does not affect confidentiality or availability directly. The CVSS v3.1 base score is 5.3, reflecting medium severity with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are currently reported, but the vulnerability represents a risk to any WordPress site using this plugin, especially those managing critical or sensitive data related to blood donation and donor management.
Potential Impact
The primary impact of CVE-2025-12877 is unauthorized modification of data integrity through deletion of arbitrary posts on WordPress sites using the vulnerable IDonate plugin. This can disrupt the management of blood donation requests and donor information, potentially causing operational issues for organizations relying on this system. Although confidentiality and availability are not directly affected, the loss or tampering of data can undermine trust, cause administrative overhead to restore data, and potentially impact patient care coordination or donor management workflows. Organizations running this plugin on public-facing WordPress sites are at risk of remote exploitation without authentication, increasing the attack surface. The vulnerability could be leveraged by attackers to deface sites, remove critical donation requests, or sabotage donor records, which may have reputational and functional consequences. Given the plugin’s niche use in healthcare-related contexts, the impact may be more severe for organizations where data integrity is critical for compliance and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-12877, organizations should immediately update the IDonate plugin to a version that includes proper authorization checks once available from the vendor. In the absence of an official patch, administrators should implement compensating controls such as restricting access to the vulnerable function via web application firewall (WAF) rules that block unauthorized requests targeting the panding_blood_request_action() endpoint. Additionally, review and tighten WordPress user roles and permissions to minimize exposure. Monitoring web server logs for suspicious requests attempting to invoke this function can help detect exploitation attempts. Regular backups of WordPress content and database are critical to enable recovery from unauthorized deletions. Organizations should also consider isolating or segmenting the WordPress environment to limit the blast radius of potential attacks. Finally, maintain awareness of vendor advisories and apply patches promptly when released.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan
CVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
Description
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12877 is a vulnerability identified in the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, developed by themeatelier. The issue stems from a missing authorization (capability) check in the panding_blood_request_action() function, which is responsible for handling blood request actions. Because this function does not verify whether the user has the appropriate permissions, unauthenticated attackers can invoke it to delete arbitrary posts on the affected WordPress site. This vulnerability affects all versions of the plugin up to and including 2.1.15. The lack of authentication and user interaction requirements makes exploitation straightforward, as attackers can send crafted requests directly to the vulnerable endpoint. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. While the impact is limited to integrity (unauthorized deletion of posts), it does not affect confidentiality or availability directly. The CVSS v3.1 base score is 5.3, reflecting medium severity with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are currently reported, but the vulnerability represents a risk to any WordPress site using this plugin, especially those managing critical or sensitive data related to blood donation and donor management.
Potential Impact
The primary impact of CVE-2025-12877 is unauthorized modification of data integrity through deletion of arbitrary posts on WordPress sites using the vulnerable IDonate plugin. This can disrupt the management of blood donation requests and donor information, potentially causing operational issues for organizations relying on this system. Although confidentiality and availability are not directly affected, the loss or tampering of data can undermine trust, cause administrative overhead to restore data, and potentially impact patient care coordination or donor management workflows. Organizations running this plugin on public-facing WordPress sites are at risk of remote exploitation without authentication, increasing the attack surface. The vulnerability could be leveraged by attackers to deface sites, remove critical donation requests, or sabotage donor records, which may have reputational and functional consequences. Given the plugin’s niche use in healthcare-related contexts, the impact may be more severe for organizations where data integrity is critical for compliance and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-12877, organizations should immediately update the IDonate plugin to a version that includes proper authorization checks once available from the vendor. In the absence of an official patch, administrators should implement compensating controls such as restricting access to the vulnerable function via web application firewall (WAF) rules that block unauthorized requests targeting the panding_blood_request_action() endpoint. Additionally, review and tighten WordPress user roles and permissions to minimize exposure. Monitoring web server logs for suspicious requests attempting to invoke this function can help detect exploitation attempts. Regular backups of WordPress content and database are critical to enable recovery from unauthorized deletions. Organizations should also consider isolating or segmenting the WordPress environment to limit the blast radius of potential attacks. Finally, maintain awareness of vendor advisories and apply patches promptly when released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-07T15:39:01.133Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69216996633f6b6b24ab4788
Added to database: 11/22/2025, 7:43:18 AM
Last enriched: 2/27/2026, 9:16:11 PM
Last updated: 3/24/2026, 2:55:06 PM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.