Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13334: CWE-862 Missing Authorization in blazethemes Blaze Demo Importer

0
High
VulnerabilityCVE-2025-13334cvecve-2025-13334cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:58 UTC)
Source: CVE Database V5
Vendor/Project: blazethemes
Product: Blaze Demo Importer

Description

The Blaze Demo Importer plugin for WordPress is vulnerable to unauthorized database resets and file deletion due to a missing capability check on the "blaze_demo_importer_install_demo" function in all versions up to, and including, 1.0.13. This makes it possible for authenticated attackers, with subscriber level access and above, to reset the database by truncating all tables (except options, usermeta, and users), delete all sidebar widgets, theme modifications, and content of the uploads folder.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:41:54 UTC

Technical Analysis

CVE-2025-13334 is a critical authorization bypass vulnerability identified in the Blaze Demo Importer plugin for WordPress, affecting all versions up to and including 1.0.13. The root cause is a missing capability check in the 'blaze_demo_importer_install_demo' function, which allows authenticated users with minimal privileges (subscriber level and above) to invoke a demo import process without proper authorization. This process forcibly truncates all database tables except for options, usermeta, and users, effectively resetting most of the site's data. Additionally, it deletes all sidebar widgets, theme modifications, and the entire contents of the uploads folder, which typically contains media files. The vulnerability is remotely exploitable over the network without user interaction, and no authentication beyond subscriber-level access is required. The CVSS v3.1 base score is 8.1, reflecting high impact on integrity and availability but no confidentiality loss. Although no public exploits have been reported yet, the potential damage to WordPress sites is significant, leading to data loss and site disruption. The vulnerability stems from CWE-862 (Missing Authorization), highlighting a failure to verify user permissions before executing sensitive operations. Since the plugin is used to import demo content and reset site configurations, this flaw can be weaponized by low-privilege users or compromised accounts to cause widespread damage. No official patches were listed at the time of reporting, so mitigation requires immediate attention from site administrators.

Potential Impact

The impact of CVE-2025-13334 is severe for organizations running WordPress sites with the Blaze Demo Importer plugin installed. Exploitation results in the loss of critical website data including most database tables, sidebar widgets, theme customizations, and all uploaded media files. This leads to significant website downtime, loss of user-generated content, and potential disruption of business operations relying on the affected WordPress instance. Recovery may require restoring from backups, which may not always be recent or complete, causing prolonged service interruptions. The vulnerability can be exploited by low-privilege authenticated users, increasing the risk from compromised or malicious subscriber accounts. Organizations with multi-user WordPress environments, such as content platforms, e-commerce sites, and corporate blogs, are particularly at risk. The attack does not compromise confidentiality but severely impacts integrity and availability, potentially damaging reputation and causing financial losses. Since WordPress powers a large portion of the web, the scope of affected systems is broad, and the ease of exploitation makes this a critical threat to website stability worldwide.

Mitigation Recommendations

To mitigate CVE-2025-13334, organizations should immediately restrict access to the Blaze Demo Importer plugin functionality by limiting user roles that can interact with it, ideally removing subscriber-level users or untrusted accounts from the site. Until an official patch is released, administrators should consider disabling or uninstalling the Blaze Demo Importer plugin entirely to prevent exploitation. Implementing Web Application Firewall (WAF) rules to block requests invoking the 'blaze_demo_importer_install_demo' function can provide temporary protection. Regularly audit user accounts and permissions to ensure no unauthorized users have subscriber or higher access. Maintain frequent, tested backups of the WordPress database and uploads directory to enable rapid recovery if exploitation occurs. Monitor site logs for unusual activity related to demo import functions or database truncation attempts. Once a vendor patch becomes available, apply it promptly. Additionally, consider employing WordPress security plugins that enforce strict capability checks and monitor for privilege escalation attempts. Educate site administrators and users about the risks of low-privilege account compromise and enforce strong authentication policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T20:03:30.316Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9183650da22753edbb11

Added to database: 12/12/2025, 3:52:35 AM

Last enriched: 2/27/2026, 9:41:54 AM

Last updated: 3/26/2026, 3:47:42 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses