Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13093: CWE-862 Missing Authorization in ajitdas Devs CRM – Manage tasks, attendance and teams all together

0
Medium
VulnerabilityCVE-2025-13093cvecve-2025-13093cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:27 UTC)
Source: CVE Database V5
Vendor/Project: ajitdas
Product: Devs CRM – Manage tasks, attendance and teams all together

Description

The Devs CRM – Manage tasks, attendance and teams all together plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/devs-crm/v1/bulk-update' REST-API endpoint in all versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update leads tags.

AI-Powered Analysis

AILast updated: 12/20/2025, 06:20:16 UTC

Technical Analysis

CVE-2025-13093 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Devs CRM – Manage tasks, attendance and teams all together' developed by ajitdas. The flaw exists in the REST API endpoint '/wp-json/devs-crm/v1/bulk-update', which lacks proper capability checks to verify if the requester is authorized to perform bulk updates. This omission allows unauthenticated attackers to modify lead tags within the CRM system, potentially altering critical business data without any authentication or user interaction. The vulnerability affects all versions up to and including 1.1.8 of the plugin. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts only integrity (I:L) without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability’s presence in a widely used WordPress plugin exposes many installations to risk. The lack of authorization checks on a REST API endpoint is a common security oversight that can lead to unauthorized data manipulation, undermining trust in CRM data integrity and potentially causing operational disruptions or erroneous business decisions.

Potential Impact

For European organizations, the primary impact of this vulnerability is unauthorized modification of CRM data, specifically lead tags, which can distort sales pipelines, marketing segmentation, and customer relationship management processes. While it does not expose sensitive data or cause service outages, the integrity compromise can lead to misinformed business decisions, loss of customer trust, and potential compliance issues if data accuracy is mandated by regulations such as GDPR. Organizations relying on this plugin for task, attendance, and team management may experience operational inefficiencies or reputational damage if attackers manipulate CRM data. Since exploitation requires no authentication and can be performed remotely, the risk of automated attacks or mass exploitation exists once the vulnerability becomes widely known. The absence of known exploits currently provides a window for proactive mitigation. However, organizations should treat this vulnerability seriously due to the ease of exploitation and potential business impact.

Mitigation Recommendations

1. Monitor for official patches or updates from the ajitdas plugin developer and apply them immediately once available. 2. In the interim, restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to '/wp-json/devs-crm/v1/bulk-update'. 3. Harden WordPress installations by disabling REST API endpoints not required for business operations or by requiring authentication for REST API access using plugins or custom code. 4. Conduct regular audits of CRM data integrity to detect unauthorized changes promptly. 5. Limit plugin usage to trusted environments and consider alternative CRM plugins with better security track records if timely patches are not forthcoming. 6. Educate IT and security teams about monitoring logs for suspicious REST API activity. 7. Employ network segmentation and least privilege principles to minimize the impact of potential exploitation. These steps go beyond generic advice by focusing on immediate access control and monitoring strategies tailored to the vulnerability's nature.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T20:43:33.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5014

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/20/2025, 6:20:16 AM

Last updated: 2/7/2026, 2:18:20 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats