CVE-2025-14854: CWE-862 Missing Authorization in nofearinc WP-CRM System – Manage Clients and Projects
CVE-2025-14854 is a medium severity vulnerability in the WP-CRM System WordPress plugin that allows authenticated users with subscriber-level access or higher to bypass authorization controls. The flaw exists due to missing capability checks in two AJAX functions, enabling attackers to enumerate CRM contact email addresses and modify task statuses without proper permissions. This leads to partial disclosure of personally identifiable information (PII) and unauthorized data manipulation. The vulnerability affects all versions up to and including 3. 4. 5. Exploitation requires authentication but no user interaction beyond that. There are no known exploits in the wild yet, and no official patches have been released. European organizations using this plugin in their WordPress environments, especially those handling client data, are at risk of data leakage and integrity issues. Mitigation involves restricting plugin access, monitoring user roles, and applying vendor patches once available.
AI Analysis
Technical Summary
CVE-2025-14854 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WP-CRM System plugin for WordPress, specifically versions up to 3.4.5. The vulnerability arises because the plugin's AJAX functions wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status do not perform proper capability checks before processing requests. This security oversight allows any authenticated user with subscriber-level privileges or higher to invoke these AJAX endpoints and enumerate email addresses stored in the CRM database, leading to unauthorized disclosure of personally identifiable information (PII). Additionally, attackers can modify the status of CRM tasks, compromising data integrity and potentially disrupting project management workflows. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. No public exploits are known, and no patches have been officially released as of the publication date. The flaw is significant because WordPress is widely used, and the WP-CRM System plugin is popular among organizations managing client and project data, making the exposure of sensitive contact information and unauthorized task modifications a critical concern for data privacy and operational reliability.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of client contact information, which may include sensitive personal data protected under GDPR. Exposure of such PII can lead to regulatory penalties, reputational damage, and loss of client trust. Unauthorized modification of task statuses can disrupt business processes, causing project delays or mismanagement. Organizations relying on WP-CRM System for client management are particularly vulnerable, especially small to medium enterprises that may have limited security controls. Since exploitation requires only subscriber-level authentication, attackers could leverage compromised or weak user accounts to exploit the flaw. The impact extends to compliance risks, operational disruptions, and potential data breaches, all of which are critical concerns for European entities handling personal and business data.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict access controls on WordPress user roles, limiting subscriber-level accounts and auditing existing users for unnecessary privileges. Employing Web Application Firewalls (WAFs) to monitor and block suspicious AJAX requests targeting wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status endpoints can reduce exploitation risk. Regularly review and harden WordPress security configurations, including disabling unused plugins and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). Organizations should monitor logs for unusual activity related to CRM data access and task status changes. Once a vendor patch becomes available, prioritize its deployment. Additionally, consider isolating the CRM plugin environment or using role-based access control plugins to enforce stricter authorization checks. Conduct security awareness training for users to prevent credential compromise that could facilitate exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-14854: CWE-862 Missing Authorization in nofearinc WP-CRM System – Manage Clients and Projects
Description
CVE-2025-14854 is a medium severity vulnerability in the WP-CRM System WordPress plugin that allows authenticated users with subscriber-level access or higher to bypass authorization controls. The flaw exists due to missing capability checks in two AJAX functions, enabling attackers to enumerate CRM contact email addresses and modify task statuses without proper permissions. This leads to partial disclosure of personally identifiable information (PII) and unauthorized data manipulation. The vulnerability affects all versions up to and including 3. 4. 5. Exploitation requires authentication but no user interaction beyond that. There are no known exploits in the wild yet, and no official patches have been released. European organizations using this plugin in their WordPress environments, especially those handling client data, are at risk of data leakage and integrity issues. Mitigation involves restricting plugin access, monitoring user roles, and applying vendor patches once available.
AI-Powered Analysis
Technical Analysis
CVE-2025-14854 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WP-CRM System plugin for WordPress, specifically versions up to 3.4.5. The vulnerability arises because the plugin's AJAX functions wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status do not perform proper capability checks before processing requests. This security oversight allows any authenticated user with subscriber-level privileges or higher to invoke these AJAX endpoints and enumerate email addresses stored in the CRM database, leading to unauthorized disclosure of personally identifiable information (PII). Additionally, attackers can modify the status of CRM tasks, compromising data integrity and potentially disrupting project management workflows. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. No public exploits are known, and no patches have been officially released as of the publication date. The flaw is significant because WordPress is widely used, and the WP-CRM System plugin is popular among organizations managing client and project data, making the exposure of sensitive contact information and unauthorized task modifications a critical concern for data privacy and operational reliability.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of client contact information, which may include sensitive personal data protected under GDPR. Exposure of such PII can lead to regulatory penalties, reputational damage, and loss of client trust. Unauthorized modification of task statuses can disrupt business processes, causing project delays or mismanagement. Organizations relying on WP-CRM System for client management are particularly vulnerable, especially small to medium enterprises that may have limited security controls. Since exploitation requires only subscriber-level authentication, attackers could leverage compromised or weak user accounts to exploit the flaw. The impact extends to compliance risks, operational disruptions, and potential data breaches, all of which are critical concerns for European entities handling personal and business data.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict access controls on WordPress user roles, limiting subscriber-level accounts and auditing existing users for unnecessary privileges. Employing Web Application Firewalls (WAFs) to monitor and block suspicious AJAX requests targeting wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status endpoints can reduce exploitation risk. Regularly review and harden WordPress security configurations, including disabling unused plugins and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). Organizations should monitor logs for unusual activity related to CRM data access and task status changes. Once a vendor patch becomes available, prioritize its deployment. Additionally, consider isolating the CRM plugin environment or using role-based access control plugins to enforce stricter authorization checks. Conduct security awareness training for users to prevent credential compromise that could facilitate exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-17T20:47:41.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69672e018330e067168f400f
Added to database: 1/14/2026, 5:47:45 AM
Last enriched: 1/21/2026, 8:29:42 PM
Last updated: 2/7/2026, 3:13:47 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.