CVE-2025-13093: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/devs-crm/v1/bulk-update' REST-API endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update leads tags.
AI Analysis
Technical Summary
CVE-2025-13093 identifies a missing authorization vulnerability (CWE-862) in the ajitdas Devs CRM – Manage tasks, attendance and teams all together WordPress plugin. The vulnerability exists in the REST API endpoint '/wp-json/devs-crm/v1/bulk-update', which lacks proper capability checks, allowing unauthenticated attackers to perform bulk updates on lead tags. This means that any attacker can modify CRM data without needing credentials or user interaction, compromising data integrity. The vulnerability affects all versions up to 1.1.8 of the plugin. The CVSS 3.1 score is 5.3 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are currently available, but the flaw presents a risk for unauthorized data manipulation, potentially disrupting business processes relying on accurate CRM data. The vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, especially SMEs and enterprises relying on WordPress-based CRM solutions, this vulnerability could lead to unauthorized modification of customer data, specifically lead tags. While it does not expose confidential information or cause service outages, the integrity compromise can disrupt marketing, sales, and customer management workflows, leading to misinformed business decisions or reputational damage. Attackers could manipulate lead data to skew analytics or sabotage campaigns. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations with publicly accessible WordPress sites using the affected plugin. The impact is more pronounced in sectors where CRM data accuracy is critical, such as finance, retail, and professional services. Additionally, regulatory compliance issues may arise if data integrity controls are mandated under GDPR or other frameworks.
Mitigation Recommendations
Immediate mitigation involves restricting access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules to block unauthenticated requests to '/wp-json/devs-crm/v1/bulk-update'. Organizations should monitor API logs for unusual bulk update activity and implement rate limiting to reduce exploitation risk. Until an official patch is released, disabling or removing the Devs CRM plugin is advisable if feasible. Administrators should ensure WordPress core and all plugins are kept up to date and subscribe to security advisories from the vendor and WordPress security communities. Employing strong network segmentation and limiting public exposure of administrative endpoints can further reduce risk. Post-patch, verify that capability checks are enforced on all REST API endpoints. Conduct regular audits of CRM data integrity to detect unauthorized changes promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13093: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together
Description
The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/devs-crm/v1/bulk-update' REST-API endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update leads tags.
AI-Powered Analysis
Technical Analysis
CVE-2025-13093 identifies a missing authorization vulnerability (CWE-862) in the ajitdas Devs CRM – Manage tasks, attendance and teams all together WordPress plugin. The vulnerability exists in the REST API endpoint '/wp-json/devs-crm/v1/bulk-update', which lacks proper capability checks, allowing unauthenticated attackers to perform bulk updates on lead tags. This means that any attacker can modify CRM data without needing credentials or user interaction, compromising data integrity. The vulnerability affects all versions up to 1.1.8 of the plugin. The CVSS 3.1 score is 5.3 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are currently available, but the flaw presents a risk for unauthorized data manipulation, potentially disrupting business processes relying on accurate CRM data. The vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, especially SMEs and enterprises relying on WordPress-based CRM solutions, this vulnerability could lead to unauthorized modification of customer data, specifically lead tags. While it does not expose confidential information or cause service outages, the integrity compromise can disrupt marketing, sales, and customer management workflows, leading to misinformed business decisions or reputational damage. Attackers could manipulate lead data to skew analytics or sabotage campaigns. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations with publicly accessible WordPress sites using the affected plugin. The impact is more pronounced in sectors where CRM data accuracy is critical, such as finance, retail, and professional services. Additionally, regulatory compliance issues may arise if data integrity controls are mandated under GDPR or other frameworks.
Mitigation Recommendations
Immediate mitigation involves restricting access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules to block unauthenticated requests to '/wp-json/devs-crm/v1/bulk-update'. Organizations should monitor API logs for unusual bulk update activity and implement rate limiting to reduce exploitation risk. Until an official patch is released, disabling or removing the Devs CRM plugin is advisable if feasible. Administrators should ensure WordPress core and all plugins are kept up to date and subscribe to security advisories from the vendor and WordPress security communities. Employing strong network segmentation and limiting public exposure of administrative endpoints can further reduce risk. Post-patch, verify that capability checks are enforced on all REST API endpoints. Conduct regular audits of CRM data integrity to detect unauthorized changes promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T20:43:33.736Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5014
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/13/2025, 5:07:54 AM
Last updated: 12/15/2025, 12:32:26 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
MediumCVE-2025-14692: Open Redirect in Mayan EDMS
MediumCVE-2025-14691: Cross Site Scripting in Mayan EDMS
MediumCVE-2025-67900: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in NXLog NXLog Agent
HighCVE-2025-67899: CWE-674 Uncontrolled Recursion in uriparser project uriparser
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.