CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI Analysis
Technical Summary
CVE-2025-14074 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'PDF for Contact Form 7 + Drag and Drop Template Builder' developed by addonsorg. The flaw exists in the 'rednumber_duplicate' function, which lacks proper capability checks before allowing post duplication. This means that any authenticated user with at least Subscriber-level privileges can invoke this function to duplicate any post on the WordPress site, including those marked as private or protected by passwords. The vulnerability affects all versions up to and including 6.3.3. Exploitation requires no additional user interaction and can be performed remotely via the WordPress interface. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact from unauthorized duplication of content. There is no known exploit in the wild at this time, and no official patches have been linked yet. The vulnerability does not affect integrity or availability directly but poses a risk of data leakage by exposing content that should remain restricted. This issue is particularly concerning for organizations that use this plugin to manage sensitive or private content on their WordPress sites.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive or confidential information hosted on WordPress sites using the affected plugin. Since the flaw allows duplication of private or password-protected posts, attackers with low-level authenticated access can exfiltrate data without elevating privileges. This could impact sectors handling personal data, intellectual property, or confidential communications, such as healthcare, finance, legal, and government entities. The exposure of private content may lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Although the vulnerability does not allow modification or deletion of content, the confidentiality breach alone is significant. Organizations relying on WordPress for public-facing or intranet sites should be vigilant, especially if they permit subscriber-level registrations or have weak user access controls.
Mitigation Recommendations
1. Immediately review and restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites handling sensitive content. 2. Monitor the vendor’s channels for official patches or updates addressing this vulnerability and apply them promptly once available. 3. Until a patch is released, implement custom access control measures such as disabling or restricting the 'rednumber_duplicate' function via WordPress hooks or security plugins that can intercept unauthorized duplication attempts. 4. Conduct regular audits of duplicated posts to detect unauthorized content replication. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the duplication function. 6. Educate site administrators and users about the risks of granting unnecessary privileges and enforce strong authentication policies. 7. Consider isolating sensitive content behind additional authentication layers or alternative content management solutions if feasible.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14074: CWE-862 Missing Authorization in addonsorg PDF for Contact Form 7 + Drag and Drop Template Builder
Description
The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.
AI-Powered Analysis
Technical Analysis
CVE-2025-14074 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'PDF for Contact Form 7 + Drag and Drop Template Builder' developed by addonsorg. The flaw exists in the 'rednumber_duplicate' function, which lacks proper capability checks before allowing post duplication. This means that any authenticated user with at least Subscriber-level privileges can invoke this function to duplicate any post on the WordPress site, including those marked as private or protected by passwords. The vulnerability affects all versions up to and including 6.3.3. Exploitation requires no additional user interaction and can be performed remotely via the WordPress interface. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact from unauthorized duplication of content. There is no known exploit in the wild at this time, and no official patches have been linked yet. The vulnerability does not affect integrity or availability directly but poses a risk of data leakage by exposing content that should remain restricted. This issue is particularly concerning for organizations that use this plugin to manage sensitive or private content on their WordPress sites.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive or confidential information hosted on WordPress sites using the affected plugin. Since the flaw allows duplication of private or password-protected posts, attackers with low-level authenticated access can exfiltrate data without elevating privileges. This could impact sectors handling personal data, intellectual property, or confidential communications, such as healthcare, finance, legal, and government entities. The exposure of private content may lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Although the vulnerability does not allow modification or deletion of content, the confidentiality breach alone is significant. Organizations relying on WordPress for public-facing or intranet sites should be vigilant, especially if they permit subscriber-level registrations or have weak user access controls.
Mitigation Recommendations
1. Immediately review and restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites handling sensitive content. 2. Monitor the vendor’s channels for official patches or updates addressing this vulnerability and apply them promptly once available. 3. Until a patch is released, implement custom access control measures such as disabling or restricting the 'rednumber_duplicate' function via WordPress hooks or security plugins that can intercept unauthorized duplication attempts. 4. Conduct regular audits of duplicated posts to detect unauthorized content replication. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the duplication function. 6. Educate site administrators and users about the risks of granting unnecessary privileges and enforce strong authentication policies. 7. Consider isolating sensitive content behind additional authentication layers or alternative content management solutions if feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T22:17:05.573Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693be422406b3dd4e02223d8
Added to database: 12/12/2025, 9:45:06 AM
Last enriched: 12/19/2025, 11:19:37 AM
Last updated: 2/7/2026, 9:45:38 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.