Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14854: CWE-862 Missing Authorization in nofearinc WP-CRM System – Manage Clients and Projects

0
Medium
VulnerabilityCVE-2025-14854cvecve-2025-14854cwe-862
Published: Wed Jan 14 2026 (01/14/2026, 05:28:12 UTC)
Source: CVE Database V5
Vendor/Project: nofearinc
Product: WP-CRM System – Manage Clients and Projects

Description

CVE-2025-14854 is a medium severity vulnerability in the WP-CRM System WordPress plugin that allows authenticated users with subscriber-level access or higher to bypass authorization controls. The flaw exists due to missing capability checks in two AJAX functions, enabling attackers to enumerate CRM contact email addresses and modify task statuses without proper permissions. This leads to partial disclosure of personally identifiable information (PII) and unauthorized data manipulation. The vulnerability affects all versions up to and including 3. 4. 5. Exploitation requires authentication but no user interaction beyond that. There are no known exploits in the wild yet, and no official patches have been released. European organizations using this plugin in their WordPress environments, especially those handling client data, are at risk of data leakage and integrity issues. Mitigation involves restricting plugin access, monitoring user roles, and applying vendor patches once available.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:29:42 UTC

Technical Analysis

CVE-2025-14854 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WP-CRM System plugin for WordPress, specifically versions up to 3.4.5. The vulnerability arises because the plugin's AJAX functions wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status do not perform proper capability checks before processing requests. This security oversight allows any authenticated user with subscriber-level privileges or higher to invoke these AJAX endpoints and enumerate email addresses stored in the CRM database, leading to unauthorized disclosure of personally identifiable information (PII). Additionally, attackers can modify the status of CRM tasks, compromising data integrity and potentially disrupting project management workflows. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. No public exploits are known, and no patches have been officially released as of the publication date. The flaw is significant because WordPress is widely used, and the WP-CRM System plugin is popular among organizations managing client and project data, making the exposure of sensitive contact information and unauthorized task modifications a critical concern for data privacy and operational reliability.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of client contact information, which may include sensitive personal data protected under GDPR. Exposure of such PII can lead to regulatory penalties, reputational damage, and loss of client trust. Unauthorized modification of task statuses can disrupt business processes, causing project delays or mismanagement. Organizations relying on WP-CRM System for client management are particularly vulnerable, especially small to medium enterprises that may have limited security controls. Since exploitation requires only subscriber-level authentication, attackers could leverage compromised or weak user accounts to exploit the flaw. The impact extends to compliance risks, operational disruptions, and potential data breaches, all of which are critical concerns for European entities handling personal and business data.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict access controls on WordPress user roles, limiting subscriber-level accounts and auditing existing users for unnecessary privileges. Employing Web Application Firewalls (WAFs) to monitor and block suspicious AJAX requests targeting wpcrm_get_email_recipients and wpcrm_system_ajax_task_change_status endpoints can reduce exploitation risk. Regularly review and harden WordPress security configurations, including disabling unused plugins and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). Organizations should monitor logs for unusual activity related to CRM data access and task status changes. Once a vendor patch becomes available, prioritize its deployment. Additionally, consider isolating the CRM plugin environment or using role-based access control plugins to enforce stricter authorization checks. Conduct security awareness training for users to prevent credential compromise that could facilitate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-17T20:47:41.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e018330e067168f400f

Added to database: 1/14/2026, 5:47:45 AM

Last enriched: 1/21/2026, 8:29:42 PM

Last updated: 2/7/2026, 3:13:47 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats