Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13313: CWE-862 Missing Authorization in dripadmin CRM Memberships

0
Critical
VulnerabilityCVE-2025-13313cvecve-2025-13313cwe-862
Published: Fri Dec 05 2025 (12/05/2025, 04:29:12 UTC)
Source: CVE Database V5
Vendor/Project: dripadmin
Product: CRM Memberships

Description

The CRM Memberships plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 2.5. This is due to missing authorization and authentication checks on the `ntzcrm_changepassword` AJAX action. This makes it possible for unauthenticated attackers to reset arbitrary user passwords and gain unauthorized access to user accounts via the `ntzcrm_changepassword` endpoint, granted they can obtain or enumerate a target user's email address. The plugin also exposes the `ntzcrm_get_users` endpoint without authentication, allowing attackers to enumerate subscriber email addresses, facilitating the exploitation of the password reset vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:40:04 UTC

Technical Analysis

CVE-2025-13313 is a critical security vulnerability in the dripadmin CRM Memberships plugin for WordPress, present in all versions up to and including 2.5. The root cause is a missing authorization and authentication check on the AJAX action ntzcrm_changepassword, which handles password reset requests. This flaw allows unauthenticated attackers to reset passwords for arbitrary users if they can obtain or enumerate the target user's email address. The plugin further exposes the ntzcrm_get_users endpoint without authentication, enabling attackers to enumerate subscriber email addresses easily. By chaining these weaknesses, an attacker can gain unauthorized access to user accounts, effectively escalating privileges without any authentication or user interaction. The vulnerability impacts confidentiality (unauthorized access to user accounts), integrity (password changes without consent), and availability (potential account lockout or misuse). The CVSS v3.1 base score is 9.8, reflecting its critical nature due to network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the ease of exploitation and the severity of impact make this a high-risk vulnerability requiring immediate attention from site administrators and security teams.

Potential Impact

The exploitation of CVE-2025-13313 can have severe consequences for organizations worldwide. Unauthorized password resets allow attackers to take over user accounts, potentially including administrative accounts if targeted, leading to full site compromise. This can result in data breaches exposing sensitive customer information, unauthorized transactions, defacement, or use of the site as a launchpad for further attacks. The ability to enumerate user emails facilitates targeted phishing or social engineering campaigns. For membership-based sites, this undermines user trust and can cause significant reputational damage. The vulnerability affects all sites running the vulnerable plugin versions, which may include e-commerce, subscription services, and community platforms. The broad impact on confidentiality, integrity, and availability, combined with the ease of exploitation, makes this a critical threat to affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the dripadmin CRM Memberships plugin to a patched version once released by the vendor. Until a patch is available, administrators should consider disabling or restricting access to the vulnerable AJAX endpoints (ntzcrm_changepassword and ntzcrm_get_users) via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated access. Implementing strict authentication and authorization checks on these endpoints is essential. Monitoring logs for unusual password reset requests or access to these endpoints can help detect exploitation attempts. Additionally, enforcing multi-factor authentication (MFA) for user accounts can reduce the risk of account takeover even if passwords are reset. Regularly auditing installed plugins and minimizing the use of unnecessary or untrusted plugins can reduce attack surface. Finally, educating users about phishing risks and encouraging strong, unique passwords can help mitigate downstream impacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T14:56:25.343Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69326360f88dbe026c717950

Added to database: 12/5/2025, 4:45:20 AM

Last enriched: 2/27/2026, 9:40:04 AM

Last updated: 3/23/2026, 11:56:51 PM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses