Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14854: CWE-862 Missing Authorization in nofearinc WP-CRM System – Manage Clients and Projects

0
Medium
VulnerabilityCVE-2025-14854cvecve-2025-14854cwe-862
Published: Wed Jan 14 2026 (01/14/2026, 05:28:12 UTC)
Source: CVE Database V5
Vendor/Project: nofearinc
Product: WP-CRM System – Manage Clients and Projects

Description

The WP-CRM System plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on the wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status AJAX functions in all versions up to, and including, 3.4.5. This makes it possible for authenticated attackers, with subscriber level access and above, to enumerate CRM contact email addresses (PII disclosure) and modify CRM task statuses.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:06:59 UTC

Technical Analysis

CVE-2025-14854 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP-CRM System plugin for WordPress, which is widely used for managing clients and projects. The issue stems from missing capability checks on two AJAX functions: wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status. These functions are accessible to authenticated users with subscriber-level privileges or higher, which should normally have limited access. Due to the lack of proper authorization validation, attackers can enumerate email addresses stored in the CRM, exposing personally identifiable information (PII). Additionally, they can modify the status of CRM tasks, potentially disrupting project management workflows or causing data integrity issues. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 5.4, indicating a medium severity level, with low attack complexity (AC:L) and no impact on availability (A:N). No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability affects all plugin versions up to and including 3.4.5. This flaw poses a risk to organizations relying on this plugin for client data management, especially where subscriber-level accounts are common or where internal users may have limited trust.

Potential Impact

For European organizations, the impact includes unauthorized disclosure of client email addresses, which constitutes a breach of confidentiality and may violate GDPR regulations, leading to potential legal and financial penalties. The ability to modify task statuses without authorization can undermine data integrity and disrupt project management processes, potentially affecting service delivery and operational efficiency. Organizations in sectors such as professional services, consulting, and SMEs that rely on WP-CRM System for client relationship management are particularly at risk. The exposure of PII can damage customer trust and brand reputation. Since the vulnerability requires only subscriber-level authentication, it increases the attack surface, especially in environments where user account management is lax or where external users may have subscriber access. The absence of known exploits currently reduces immediate risk but does not eliminate the threat of future exploitation. Overall, the vulnerability poses a moderate risk to confidentiality and integrity, with no direct impact on availability.

Mitigation Recommendations

Organizations should immediately audit user roles and permissions within their WordPress installations to ensure that subscriber-level accounts are tightly controlled and assigned only to trusted users. Restricting subscriber-level access or disabling unnecessary accounts can reduce exposure. Monitoring and logging AJAX requests to the wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status endpoints can help detect suspicious activity. Until an official patch is released, consider implementing Web Application Firewall (WAF) rules to block or restrict access to these AJAX functions for lower-privileged users. Additionally, organizations can employ custom code to enforce capability checks on these AJAX endpoints as a temporary workaround. Regularly update the WP-CRM System plugin once a patch becomes available and verify that the update addresses the missing authorization checks. Conduct security awareness training for administrators and users about the risks of privilege misuse. Finally, review and enhance overall WordPress security posture, including strong authentication mechanisms and least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-17T20:47:41.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e018330e067168f400f

Added to database: 1/14/2026, 5:47:45 AM

Last enriched: 1/14/2026, 6:06:59 AM

Last updated: 1/14/2026, 3:21:49 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats