CVE-2025-13093: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/devs-crm/v1/bulk-update' REST-API endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update leads tags.
AI Analysis
Technical Summary
CVE-2025-13093 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Devs CRM – Manage tasks, attendance and teams all together' developed by ajitdas. The flaw exists in the REST API endpoint '/wp-json/devs-crm/v1/bulk-update', which lacks proper capability checks to verify if the requester is authorized to perform bulk updates. This omission allows unauthenticated attackers to modify lead tags within the CRM system, potentially altering critical business data without any authentication or user interaction. The vulnerability affects all versions up to and including 1.1.8 of the plugin. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts only integrity (I:L) without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability’s presence in a widely used WordPress plugin exposes many installations to risk. The lack of authorization checks on a REST API endpoint is a common security oversight that can lead to unauthorized data manipulation, undermining trust in CRM data integrity and potentially causing operational disruptions or erroneous business decisions.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized modification of CRM data, specifically lead tags, which can distort sales pipelines, marketing segmentation, and customer relationship management processes. While it does not expose sensitive data or cause service outages, the integrity compromise can lead to misinformed business decisions, loss of customer trust, and potential compliance issues if data accuracy is mandated by regulations such as GDPR. Organizations relying on this plugin for task, attendance, and team management may experience operational inefficiencies or reputational damage if attackers manipulate CRM data. Since exploitation requires no authentication and can be performed remotely, the risk of automated attacks or mass exploitation exists once the vulnerability becomes widely known. The absence of known exploits currently provides a window for proactive mitigation. However, organizations should treat this vulnerability seriously due to the ease of exploitation and potential business impact.
Mitigation Recommendations
1. Monitor for official patches or updates from the ajitdas plugin developer and apply them immediately once available. 2. In the interim, restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to '/wp-json/devs-crm/v1/bulk-update'. 3. Harden WordPress installations by disabling REST API endpoints not required for business operations or by requiring authentication for REST API access using plugins or custom code. 4. Conduct regular audits of CRM data integrity to detect unauthorized changes promptly. 5. Limit plugin usage to trusted environments and consider alternative CRM plugins with better security track records if timely patches are not forthcoming. 6. Educate IT and security teams about monitoring logs for suspicious REST API activity. 7. Employ network segmentation and least privilege principles to minimize the impact of potential exploitation. These steps go beyond generic advice by focusing on immediate access control and monitoring strategies tailored to the vulnerability's nature.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13093: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
Description
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/devs-crm/v1/bulk-update' REST-API endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update leads tags.
AI-Powered Analysis
Technical Analysis
CVE-2025-13093 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Devs CRM – Manage tasks, attendance and teams all together' developed by ajitdas. The flaw exists in the REST API endpoint '/wp-json/devs-crm/v1/bulk-update', which lacks proper capability checks to verify if the requester is authorized to perform bulk updates. This omission allows unauthenticated attackers to modify lead tags within the CRM system, potentially altering critical business data without any authentication or user interaction. The vulnerability affects all versions up to and including 1.1.8 of the plugin. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts only integrity (I:L) without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability’s presence in a widely used WordPress plugin exposes many installations to risk. The lack of authorization checks on a REST API endpoint is a common security oversight that can lead to unauthorized data manipulation, undermining trust in CRM data integrity and potentially causing operational disruptions or erroneous business decisions.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized modification of CRM data, specifically lead tags, which can distort sales pipelines, marketing segmentation, and customer relationship management processes. While it does not expose sensitive data or cause service outages, the integrity compromise can lead to misinformed business decisions, loss of customer trust, and potential compliance issues if data accuracy is mandated by regulations such as GDPR. Organizations relying on this plugin for task, attendance, and team management may experience operational inefficiencies or reputational damage if attackers manipulate CRM data. Since exploitation requires no authentication and can be performed remotely, the risk of automated attacks or mass exploitation exists once the vulnerability becomes widely known. The absence of known exploits currently provides a window for proactive mitigation. However, organizations should treat this vulnerability seriously due to the ease of exploitation and potential business impact.
Mitigation Recommendations
1. Monitor for official patches or updates from the ajitdas plugin developer and apply them immediately once available. 2. In the interim, restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to '/wp-json/devs-crm/v1/bulk-update'. 3. Harden WordPress installations by disabling REST API endpoints not required for business operations or by requiring authentication for REST API access using plugins or custom code. 4. Conduct regular audits of CRM data integrity to detect unauthorized changes promptly. 5. Limit plugin usage to trusted environments and consider alternative CRM plugins with better security track records if timely patches are not forthcoming. 6. Educate IT and security teams about monitoring logs for suspicious REST API activity. 7. Employ network segmentation and least privilege principles to minimize the impact of potential exploitation. These steps go beyond generic advice by focusing on immediate access control and monitoring strategies tailored to the vulnerability's nature.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T20:43:33.736Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5014
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/20/2025, 6:20:16 AM
Last updated: 2/7/2026, 2:18:20 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.