CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI Analysis
Technical Summary
CVE-2025-14074 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the 'PDF for Contact Form 7 + Drag and Drop Template Builder' WordPress plugin developed by addonsorg. The issue stems from the absence of a capability check in the 'rednumber_duplicate' function, which is responsible for duplicating posts within the plugin's functionality. This missing authorization allows any authenticated user with at least Subscriber-level privileges to duplicate arbitrary posts, including those marked as private or password-protected. Since WordPress Subscriber roles are typically assigned to users with minimal permissions, this vulnerability significantly lowers the barrier for exploitation. The duplication process does not require user interaction beyond authentication, and the attack vector is network accessible (remote). The CVSS v3.1 score is 5.3 (medium), reflecting the limited impact on integrity and availability but a moderate confidentiality risk due to unauthorized duplication of sensitive content. The vulnerability affects all plugin versions up to 6.3.3, with no patches currently available and no known exploits in the wild. This flaw could be leveraged by attackers to exfiltrate sensitive information or create unauthorized copies of content, potentially leading to data leakage or privacy violations. The vulnerability does not allow modification or deletion of posts, nor does it cause denial of service, but the confidentiality breach risk is notable given the exposure of private or password-protected posts.
Potential Impact
The primary impact of CVE-2025-14074 is unauthorized disclosure of sensitive content through duplication of posts that should be restricted, including private and password-protected posts. Organizations using the affected plugin may face confidentiality breaches if attackers with Subscriber-level access exploit this vulnerability to copy sensitive data. This can lead to exposure of proprietary information, customer data, or internal communications. While the vulnerability does not affect data integrity or availability, the unauthorized duplication could facilitate further attacks such as social engineering or phishing by exposing internal content. The ease of exploitation—requiring only authenticated Subscriber-level access—means that compromised or malicious low-privilege accounts can be leveraged to exploit this flaw. This risk is particularly significant for organizations that allow user registrations or have multiple contributors with Subscriber roles. The absence of patches and known exploits in the wild suggests a window of exposure until a fix is released and applied. Overall, the vulnerability poses a moderate risk to confidentiality and privacy for affected WordPress sites worldwide.
Mitigation Recommendations
1. Immediately restrict user registrations or limit Subscriber-level access to trusted users only to reduce the attack surface. 2. Monitor WordPress logs and plugin activity for unusual post duplication events, especially involving private or password-protected posts. 3. Implement strict access controls and review user roles to ensure minimal necessary privileges are assigned. 4. Disable or remove the 'PDF for Contact Form 7 + Drag and Drop Template Builder' plugin if it is not essential to reduce exposure. 5. Follow the vendor and WordPress plugin repository for updates and apply patches promptly once available. 6. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the duplication function. 7. Educate site administrators and users about the risks of unauthorized content duplication and encourage strong authentication practices. 8. Conduct regular security audits of WordPress plugins and configurations to identify and remediate similar authorization issues proactively.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, India, France, Brazil, Netherlands, Japan
CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
Description
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14074 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the 'PDF for Contact Form 7 + Drag and Drop Template Builder' WordPress plugin developed by addonsorg. The issue stems from the absence of a capability check in the 'rednumber_duplicate' function, which is responsible for duplicating posts within the plugin's functionality. This missing authorization allows any authenticated user with at least Subscriber-level privileges to duplicate arbitrary posts, including those marked as private or password-protected. Since WordPress Subscriber roles are typically assigned to users with minimal permissions, this vulnerability significantly lowers the barrier for exploitation. The duplication process does not require user interaction beyond authentication, and the attack vector is network accessible (remote). The CVSS v3.1 score is 5.3 (medium), reflecting the limited impact on integrity and availability but a moderate confidentiality risk due to unauthorized duplication of sensitive content. The vulnerability affects all plugin versions up to 6.3.3, with no patches currently available and no known exploits in the wild. This flaw could be leveraged by attackers to exfiltrate sensitive information or create unauthorized copies of content, potentially leading to data leakage or privacy violations. The vulnerability does not allow modification or deletion of posts, nor does it cause denial of service, but the confidentiality breach risk is notable given the exposure of private or password-protected posts.
Potential Impact
The primary impact of CVE-2025-14074 is unauthorized disclosure of sensitive content through duplication of posts that should be restricted, including private and password-protected posts. Organizations using the affected plugin may face confidentiality breaches if attackers with Subscriber-level access exploit this vulnerability to copy sensitive data. This can lead to exposure of proprietary information, customer data, or internal communications. While the vulnerability does not affect data integrity or availability, the unauthorized duplication could facilitate further attacks such as social engineering or phishing by exposing internal content. The ease of exploitation—requiring only authenticated Subscriber-level access—means that compromised or malicious low-privilege accounts can be leveraged to exploit this flaw. This risk is particularly significant for organizations that allow user registrations or have multiple contributors with Subscriber roles. The absence of patches and known exploits in the wild suggests a window of exposure until a fix is released and applied. Overall, the vulnerability poses a moderate risk to confidentiality and privacy for affected WordPress sites worldwide.
Mitigation Recommendations
1. Immediately restrict user registrations or limit Subscriber-level access to trusted users only to reduce the attack surface. 2. Monitor WordPress logs and plugin activity for unusual post duplication events, especially involving private or password-protected posts. 3. Implement strict access controls and review user roles to ensure minimal necessary privileges are assigned. 4. Disable or remove the 'PDF for Contact Form 7 + Drag and Drop Template Builder' plugin if it is not essential to reduce exposure. 5. Follow the vendor and WordPress plugin repository for updates and apply patches promptly once available. 6. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the duplication function. 7. Educate site administrators and users about the risks of unauthorized content duplication and encourage strong authentication practices. 8. Conduct regular security audits of WordPress plugins and configurations to identify and remediate similar authorization issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T22:17:05.573Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693be422406b3dd4e02223d8
Added to database: 12/12/2025, 9:45:06 AM
Last enriched: 2/27/2026, 10:48:10 AM
Last updated: 3/26/2026, 9:28:57 AM
Views: 134
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.