CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI Analysis
Technical Summary
CVE-2025-14074 is a vulnerability identified in the WordPress plugin 'PDF for Contact Form 7 + Drag and Drop Template Builder' developed by addonsorg. The issue stems from a missing authorization (CWE-862) in the 'rednumber_duplicate' function, which is responsible for duplicating posts within the WordPress environment. This missing capability check allows any authenticated user with Subscriber-level permissions or higher to duplicate arbitrary posts, including those that are private or password protected. The vulnerability affects all versions up to and including 6.3.3. Since Subscriber-level users typically have limited access, this escalation of capability to duplicate posts without proper authorization represents a significant security flaw. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as unauthorized duplication of posts could lead to exposure of sensitive or restricted content. There is no impact on integrity or availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is relevant in WordPress environments where this plugin is installed, especially in multi-user scenarios where Subscriber roles are assigned.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive or confidential information contained within private or password-protected posts. This could lead to data leakage, reputational damage, and potential compliance issues under regulations such as GDPR if personal data is exposed. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, organizations relying on WordPress sites with multiple user roles, especially those granting Subscriber-level access to external or less trusted users, are at risk. Attackers could leverage this vulnerability to clone sensitive content, which might be used for further social engineering or phishing attacks. The medium severity score reflects a moderate risk that should be addressed promptly to prevent exploitation. Since no known exploits exist yet, proactive mitigation can reduce risk before active attacks emerge.
Mitigation Recommendations
1. Immediately audit user roles and permissions in WordPress, ensuring that Subscriber-level users do not have unnecessary access to sensitive content. 2. Temporarily restrict or disable the 'PDF for Contact Form 7 + Drag and Drop Template Builder' plugin if possible until a patch is released. 3. Monitor WordPress logs and database for unusual post duplication activities, especially involving private or password-protected posts. 4. Implement strict access controls and consider using additional WordPress security plugins that enforce capability checks or limit plugin functionality. 5. Educate site administrators and users about the risk and encourage vigilance for suspicious behavior. 6. Once a patch or update is released by addonsorg, apply it promptly. 7. Consider isolating sensitive content in separate environments or using alternative plugins with better security track records. 8. Regularly back up WordPress content to enable recovery in case of misuse or data exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
Description
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI-Powered Analysis
Technical Analysis
CVE-2025-14074 is a vulnerability identified in the WordPress plugin 'PDF for Contact Form 7 + Drag and Drop Template Builder' developed by addonsorg. The issue stems from a missing authorization (CWE-862) in the 'rednumber_duplicate' function, which is responsible for duplicating posts within the WordPress environment. This missing capability check allows any authenticated user with Subscriber-level permissions or higher to duplicate arbitrary posts, including those that are private or password protected. The vulnerability affects all versions up to and including 6.3.3. Since Subscriber-level users typically have limited access, this escalation of capability to duplicate posts without proper authorization represents a significant security flaw. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as unauthorized duplication of posts could lead to exposure of sensitive or restricted content. There is no impact on integrity or availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is relevant in WordPress environments where this plugin is installed, especially in multi-user scenarios where Subscriber roles are assigned.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive or confidential information contained within private or password-protected posts. This could lead to data leakage, reputational damage, and potential compliance issues under regulations such as GDPR if personal data is exposed. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, organizations relying on WordPress sites with multiple user roles, especially those granting Subscriber-level access to external or less trusted users, are at risk. Attackers could leverage this vulnerability to clone sensitive content, which might be used for further social engineering or phishing attacks. The medium severity score reflects a moderate risk that should be addressed promptly to prevent exploitation. Since no known exploits exist yet, proactive mitigation can reduce risk before active attacks emerge.
Mitigation Recommendations
1. Immediately audit user roles and permissions in WordPress, ensuring that Subscriber-level users do not have unnecessary access to sensitive content. 2. Temporarily restrict or disable the 'PDF for Contact Form 7 + Drag and Drop Template Builder' plugin if possible until a patch is released. 3. Monitor WordPress logs and database for unusual post duplication activities, especially involving private or password-protected posts. 4. Implement strict access controls and consider using additional WordPress security plugins that enforce capability checks or limit plugin functionality. 5. Educate site administrators and users about the risk and encourage vigilance for suspicious behavior. 6. Once a patch or update is released by addonsorg, apply it promptly. 7. Consider isolating sensitive content in separate environments or using alternative plugins with better security track records. 8. Regularly back up WordPress content to enable recovery in case of misuse or data exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T22:17:05.573Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693be422406b3dd4e02223d8
Added to database: 12/12/2025, 9:45:06 AM
Last enriched: 12/12/2025, 9:53:05 AM
Last updated: 12/14/2025, 4:14:41 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14644: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14643: SQL Injection in code-projects Simple Attendance Record System
MediumCVE-2025-14642: Unrestricted Upload in code-projects Computer Laboratory System
MediumCVE-2025-14641: Unrestricted Upload in code-projects Computer Laboratory System
MediumCVE-2025-14640: SQL Injection in code-projects Student File Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.