CVE-2025-13092: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/devs-crm/v1/attendances REST API Endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to retrieve private user data, including password hashes.
AI Analysis
Technical Summary
CVE-2025-13092 identifies a missing authorization vulnerability (CWE-862) in the ajitdas Devs CRM – Manage tasks, attendance and teams all together WordPress plugin. The vulnerability exists because the /wp-json/devs-crm/v1/attendances REST API endpoint does not perform any capability checks to verify if the requester is authorized to access the data. Consequently, unauthenticated attackers can query this endpoint and retrieve sensitive user information, including password hashes, without any authentication or user interaction. This plugin is designed to manage tasks, attendance, and teams, implying that the data exposed could include personally identifiable information and credentials. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact to confidentiality only, with no integrity or availability impact. No official patches or fixes have been released as of the publication date, and no known exploits have been reported in the wild. The vulnerability affects all versions up to and including 1.1.8, indicating that users of this plugin should consider their installations vulnerable until remediated. The lack of authorization checks is a critical security oversight that could facilitate data breaches and subsequent attacks such as credential reuse or social engineering.
Potential Impact
For European organizations, the unauthorized exposure of private user data, including password hashes, poses significant risks. Confidentiality breaches can lead to identity theft, unauthorized access to internal systems, and lateral movement within networks if attackers leverage stolen credentials. Organizations relying on this plugin for managing employee attendance and team coordination may face operational disruptions if attackers exploit the data to impersonate users or escalate privileges. The exposure of password hashes, even if hashed, can be subjected to offline cracking attempts, especially if weak hashing algorithms are used. This vulnerability could also damage organizational reputation and lead to regulatory penalties under GDPR due to inadequate protection of personal data. The medium CVSS score suggests moderate urgency, but the ease of exploitation and sensitive nature of the data elevate the practical risk. Attackers targeting European entities with WordPress-based CRM solutions are likely to exploit this vulnerability to gain footholds or harvest credentials for broader campaigns.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict access to the /wp-json/devs-crm/v1/attendances REST API endpoint by configuring web application firewalls (WAFs) or reverse proxies to block unauthenticated requests to this path. Secondly, apply strict access controls on the WordPress installation, limiting plugin usage to trusted administrators and disabling or removing the plugin if not essential. Monitor web server and application logs for unusual requests targeting the vulnerable endpoint to detect potential exploitation attempts. Encourage users to change passwords and enforce strong password policies to mitigate risks from exposed password hashes. Once a patch is released, promptly update the plugin to the fixed version. Additionally, consider implementing multi-factor authentication (MFA) for WordPress admin accounts to reduce the impact of compromised credentials. Regularly audit installed plugins for vulnerabilities and maintain an inventory to quickly respond to emerging threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13092: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
Description
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the /wp-json/devs-crm/v1/attendances REST API Endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to retrieve private user data, including password hashes.
AI-Powered Analysis
Technical Analysis
CVE-2025-13092 identifies a missing authorization vulnerability (CWE-862) in the ajitdas Devs CRM – Manage tasks, attendance and teams all together WordPress plugin. The vulnerability exists because the /wp-json/devs-crm/v1/attendances REST API endpoint does not perform any capability checks to verify if the requester is authorized to access the data. Consequently, unauthenticated attackers can query this endpoint and retrieve sensitive user information, including password hashes, without any authentication or user interaction. This plugin is designed to manage tasks, attendance, and teams, implying that the data exposed could include personally identifiable information and credentials. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed, but limited impact to confidentiality only, with no integrity or availability impact. No official patches or fixes have been released as of the publication date, and no known exploits have been reported in the wild. The vulnerability affects all versions up to and including 1.1.8, indicating that users of this plugin should consider their installations vulnerable until remediated. The lack of authorization checks is a critical security oversight that could facilitate data breaches and subsequent attacks such as credential reuse or social engineering.
Potential Impact
For European organizations, the unauthorized exposure of private user data, including password hashes, poses significant risks. Confidentiality breaches can lead to identity theft, unauthorized access to internal systems, and lateral movement within networks if attackers leverage stolen credentials. Organizations relying on this plugin for managing employee attendance and team coordination may face operational disruptions if attackers exploit the data to impersonate users or escalate privileges. The exposure of password hashes, even if hashed, can be subjected to offline cracking attempts, especially if weak hashing algorithms are used. This vulnerability could also damage organizational reputation and lead to regulatory penalties under GDPR due to inadequate protection of personal data. The medium CVSS score suggests moderate urgency, but the ease of exploitation and sensitive nature of the data elevate the practical risk. Attackers targeting European entities with WordPress-based CRM solutions are likely to exploit this vulnerability to gain footholds or harvest credentials for broader campaigns.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict access to the /wp-json/devs-crm/v1/attendances REST API endpoint by configuring web application firewalls (WAFs) or reverse proxies to block unauthenticated requests to this path. Secondly, apply strict access controls on the WordPress installation, limiting plugin usage to trusted administrators and disabling or removing the plugin if not essential. Monitor web server and application logs for unusual requests targeting the vulnerable endpoint to detect potential exploitation attempts. Encourage users to change passwords and enforce strong password policies to mitigate risks from exposed password hashes. Once a patch is released, promptly update the plugin to the fixed version. Additionally, consider implementing multi-factor authentication (MFA) for WordPress admin accounts to reduce the impact of compromised credentials. Regularly audit installed plugins for vulnerabilities and maintain an inventory to quickly respond to emerging threats.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T20:40:30.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef62d977419e584a4fec
Added to database: 12/13/2025, 4:45:22 AM
Last enriched: 12/20/2025, 6:20:02 AM
Last updated: 2/4/2026, 7:29:37 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.