Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14364: CWE-862 Missing Authorization in kraftplugins Demo Importer Plus

0
High
VulnerabilityCVE-2025-14364cvecve-2025-14364cwe-862
Published: Thu Dec 18 2025 (12/18/2025, 09:21:30 UTC)
Source: CVE Database V5
Vendor/Project: kraftplugins
Product: Demo Importer Plus

Description

CVE-2025-14364 is a high-severity vulnerability in the WordPress plugin Demo Importer Plus (all versions up to 2. 0. 8) caused by missing authorization checks in the Ajax::handle_request() function. Authenticated users with Subscriber-level access or higher can exploit this flaw to trigger a full site reset, which drops all database tables except users and usermeta, and re-runs the WordPress installation process. This results in privilege escalation by assigning the Administrator role to the attacker’s account, leading to full site compromise. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability. No public exploits are known yet, but the ease of exploitation and severe consequences make this a significant threat. European organizations using this plugin in their WordPress environments are at risk of data loss, unauthorized access, and complete site takeover. Immediate patching or mitigation is essential to prevent exploitation.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:56:28 UTC

Technical Analysis

CVE-2025-14364 is a critical vulnerability identified in the Demo Importer Plus WordPress plugin, affecting all versions up to and including 2.0.8. The root cause is a missing authorization check (CWE-862) in the Ajax::handle_request() function, which fails to verify whether the authenticated user has sufficient privileges before processing sensitive requests. This flaw allows any authenticated user with at least Subscriber-level access to invoke a full site reset via an AJAX request. The reset operation drops all database tables except for users and usermeta, then re-runs the WordPress installation routine (wp_install()). During this process, the attacking user’s account is granted Administrator privileges, effectively escalating their access rights to full control over the WordPress site. The vulnerability impacts confidentiality by allowing unauthorized access to sensitive data, integrity by enabling unauthorized data modification and deletion, and availability by causing a site reset and potential downtime. The CVSS 3.1 score of 8.8 reflects the network attack vector (remote exploitation over the network), low attack complexity, required privileges of a low-level authenticated user, no user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability’s characteristics make it highly exploitable in practice. The absence of a patch at the time of disclosure increases the urgency for mitigation. This vulnerability is particularly dangerous because it leverages legitimate WordPress functionality (wp_install) in an unintended way, making detection and prevention challenging without proper authorization controls.

Potential Impact

For European organizations, the impact of CVE-2025-14364 can be severe. WordPress is widely used across Europe for corporate websites, e-commerce platforms, and content management. Exploitation can lead to complete site takeover, resulting in unauthorized data access, data loss, defacement, or disruption of online services. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data breaches), and cause financial losses. Organizations relying on Demo Importer Plus for site setup or content import are particularly vulnerable. The privilege escalation to Administrator allows attackers to install backdoors, exfiltrate sensitive data, or pivot to other internal systems. The loss of database tables (except users) can cause significant downtime and require extensive recovery efforts. Given the ease of exploitation by low-privilege users, insider threats or compromised subscriber accounts pose a heightened risk. The threat also extends to managed WordPress hosting providers servicing European clients, potentially affecting multiple customers.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the Demo Importer Plus plugin until a vendor patch is released. If disabling is not feasible, restrict access to authenticated users with Subscriber-level privileges or higher by implementing additional access controls at the web server or application firewall level to block unauthorized AJAX requests targeting the vulnerable function. Monitor logs for suspicious AJAX requests that could indicate exploitation attempts. Enforce strong authentication and account hygiene to reduce the risk of compromised low-privilege accounts. Backup WordPress databases regularly and verify backup integrity to enable recovery from site resets. Once a patch is available, apply it promptly. Additionally, consider implementing a Web Application Firewall (WAF) with custom rules to detect and block exploitation attempts targeting this vulnerability. Conduct security audits of WordPress plugins to identify and remediate missing authorization checks proactively. Educate administrators and users about the risks of privilege escalation vulnerabilities and the importance of least privilege principles.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T17:54:27.227Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943cc484eb3efac36794b1b

Added to database: 12/18/2025, 9:41:28 AM

Last enriched: 12/18/2025, 9:56:28 AM

Last updated: 12/18/2025, 2:05:14 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats