Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13334: CWE-862 Missing Authorization in blazethemes Blaze Demo Importer

0
High
VulnerabilityCVE-2025-13334cvecve-2025-13334cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:58 UTC)
Source: CVE Database V5
Vendor/Project: blazethemes
Product: Blaze Demo Importer

Description

The Blaze Demo Importer plugin for WordPress is vulnerable to unauthorized database resets and file deletion due to a missing capability check on the "blaze_demo_importer_install_demo" function in all versions up to, and including, 1.0.13. This makes it possible for authenticated attackers, with subscriber level access and above, to reset the database by truncating all tables (except options, usermeta, and users), delete all sidebar widgets, theme modifications, and content of the uploads folder.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:23:48 UTC

Technical Analysis

CVE-2025-13334 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Blaze Demo Importer plugin for WordPress, specifically all versions up to and including 1.0.13. The core issue lies in the absence of a capability check within the 'blaze_demo_importer_install_demo' function, which is responsible for installing demo content. This flaw allows any authenticated user with at least subscriber-level privileges to invoke this function and trigger destructive operations without proper authorization. Exploitation results in truncation of all database tables except 'options', 'usermeta', and 'users', effectively resetting most of the site's data. Additionally, it deletes all sidebar widgets, theme modifications, and the entire contents of the uploads folder, which typically contains media files. The vulnerability is remotely exploitable over the network without user interaction, and the attacker only needs to be authenticated with minimal privileges. The CVSS v3.1 score of 8.1 reflects the high impact on integrity and availability, with low attack complexity and privileges required. No patches or exploit code are currently publicly available, but the vulnerability's nature makes it a significant risk for WordPress sites using this plugin. The plugin's role in importing demo content means it has powerful database and file system access, which is improperly protected in this case.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites, particularly those using the Blaze Demo Importer plugin. The ability for low-privileged authenticated users to reset databases and delete critical site content can lead to severe operational disruptions, data loss, and reputational damage. Organizations relying on WordPress for e-commerce, customer engagement, or internal portals could face downtime and loss of customer trust. The deletion of uploads impacts media assets, which may include marketing materials or user-generated content, further exacerbating recovery efforts. Given the widespread use of WordPress across Europe, especially among SMEs and public sector entities, the threat could affect a broad range of sectors. Additionally, the lack of known exploits currently in the wild provides a window for proactive mitigation, but the ease of exploitation means attackers could develop exploits rapidly. The impact on confidentiality is low, but integrity and availability are critically affected, potentially leading to costly recovery and incident response efforts.

Mitigation Recommendations

1. Immediately audit user roles and permissions to ensure that subscriber-level accounts are assigned only to trusted users. 2. Restrict access to the Blaze Demo Importer plugin's functionality by implementing additional access controls or disabling the plugin if it is not essential. 3. Monitor WordPress logs for any suspicious activity related to the 'blaze_demo_importer_install_demo' function or unusual database truncation events. 4. Backup all WordPress site data, including databases and uploads, regularly and verify backup integrity to enable rapid recovery if exploitation occurs. 5. Apply patches or updates from the vendor as soon as they become available; if no patch exists, consider removing or replacing the plugin with a secure alternative. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the vulnerable function. 7. Educate site administrators and users about the risks of granting unnecessary privileges and enforce the principle of least privilege. 8. Conduct regular security assessments and vulnerability scans focusing on WordPress plugins and configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T20:03:30.316Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9183650da22753edbb11

Added to database: 12/12/2025, 3:52:35 AM

Last enriched: 12/19/2025, 5:23:48 AM

Last updated: 2/7/2026, 2:50:17 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats