CVE-2025-2907: CWE-862 Missing Authorization in Unknown Order Delivery Date
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
AI Analysis
Technical Summary
CVE-2025-2907 is a critical vulnerability affecting the WordPress plugin 'Order Delivery Date' in versions prior to 12.3.1, specifically version 2.0 as noted. The vulnerability stems from missing authorization and Cross-Site Request Forgery (CSRF) protections during the import of plugin settings. Additionally, the plugin fails to restrict updates solely to its own configuration options, allowing attackers to manipulate unrelated WordPress options. Exploiting this flaw, an attacker can modify the 'default_user_role' option to 'administrator' and enable 'users_can_register', effectively permitting arbitrary user registration with administrative privileges. This leads to a complete site takeover without requiring any authentication or user interaction. The CVSS 3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The underlying weaknesses correspond to CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). No known exploits in the wild have been reported yet, but the vulnerability's nature and severity make it a high-risk target for attackers aiming to compromise WordPress sites using this plugin. The absence of authorization checks and CSRF protections during settings import is a critical design flaw, allowing attackers to escalate privileges and gain full control over affected websites.
Potential Impact
For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a severe risk of complete website compromise. Attackers can gain administrative access remotely without authentication, enabling them to manipulate site content, steal sensitive data, deploy malware, or use the site as a pivot point for further attacks within the organization's network. This can lead to reputational damage, data breaches involving customer or employee information, and potential regulatory non-compliance under GDPR due to unauthorized data access or modification. E-commerce and service-oriented websites relying on WordPress are particularly vulnerable, as attackers could disrupt business operations or conduct fraudulent activities. The lack of user interaction or authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks targeting vulnerable sites. Given WordPress's widespread use in Europe, especially among small and medium enterprises, the impact can be extensive if timely mitigation is not applied.
Mitigation Recommendations
1. Immediate update of the Order Delivery Date plugin to version 12.3.1 or later where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin temporarily to prevent exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests attempting to import settings or modify critical options. 4. Monitor WordPress user roles and registrations for unexpected administrator accounts and disable any suspicious accounts promptly. 5. Restrict access to the WordPress admin panel by IP whitelisting or VPN to reduce exposure. 6. Regularly audit plugin permissions and configurations to ensure no unauthorized changes occur. 7. Educate site administrators about the risks of importing settings from untrusted sources and enforce strict operational procedures for plugin management. 8. Employ security plugins that provide enhanced authorization and CSRF protections as an additional layer of defense. 9. Conduct periodic vulnerability scans focusing on WordPress plugins to detect outdated or vulnerable components proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-2907: CWE-862 Missing Authorization in Unknown Order Delivery Date
Description
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
AI-Powered Analysis
Technical Analysis
CVE-2025-2907 is a critical vulnerability affecting the WordPress plugin 'Order Delivery Date' in versions prior to 12.3.1, specifically version 2.0 as noted. The vulnerability stems from missing authorization and Cross-Site Request Forgery (CSRF) protections during the import of plugin settings. Additionally, the plugin fails to restrict updates solely to its own configuration options, allowing attackers to manipulate unrelated WordPress options. Exploiting this flaw, an attacker can modify the 'default_user_role' option to 'administrator' and enable 'users_can_register', effectively permitting arbitrary user registration with administrative privileges. This leads to a complete site takeover without requiring any authentication or user interaction. The CVSS 3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The underlying weaknesses correspond to CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). No known exploits in the wild have been reported yet, but the vulnerability's nature and severity make it a high-risk target for attackers aiming to compromise WordPress sites using this plugin. The absence of authorization checks and CSRF protections during settings import is a critical design flaw, allowing attackers to escalate privileges and gain full control over affected websites.
Potential Impact
For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a severe risk of complete website compromise. Attackers can gain administrative access remotely without authentication, enabling them to manipulate site content, steal sensitive data, deploy malware, or use the site as a pivot point for further attacks within the organization's network. This can lead to reputational damage, data breaches involving customer or employee information, and potential regulatory non-compliance under GDPR due to unauthorized data access or modification. E-commerce and service-oriented websites relying on WordPress are particularly vulnerable, as attackers could disrupt business operations or conduct fraudulent activities. The lack of user interaction or authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks targeting vulnerable sites. Given WordPress's widespread use in Europe, especially among small and medium enterprises, the impact can be extensive if timely mitigation is not applied.
Mitigation Recommendations
1. Immediate update of the Order Delivery Date plugin to version 12.3.1 or later where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin temporarily to prevent exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests attempting to import settings or modify critical options. 4. Monitor WordPress user roles and registrations for unexpected administrator accounts and disable any suspicious accounts promptly. 5. Restrict access to the WordPress admin panel by IP whitelisting or VPN to reduce exposure. 6. Regularly audit plugin permissions and configurations to ensure no unauthorized changes occur. 7. Educate site administrators about the risks of importing settings from untrusted sources and enforce strict operational procedures for plugin management. 8. Employ security plugins that provide enhanced authorization and CSRF protections as an additional layer of defense. 9. Conduct periodic vulnerability scans focusing on WordPress plugins to detect outdated or vulnerable components proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-03-28T09:37:43.776Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbeec1d
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/22/2025, 11:51:17 AM
Last updated: 7/22/2025, 12:15:37 AM
Views: 8
Related Threats
CVE-2025-7852: CWE-434 Unrestricted Upload of File with Dangerous Type in iqonicdesign WPBookit
CriticalCVE-2025-7437: CWE-434 Unrestricted Upload of File with Dangerous Type in motovnet Ebook Store
CriticalCVE-2025-4968: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpbakery WPBakery Visual Composer
MediumCVE-2025-4395: CWE-258 Empty Password in Configuration File in Medtronic MyCareLink Patient Monitor 24950
MediumCVE-2025-4394: CWE-312 Cleartext Storage of Sensitive Information in Medtronic MyCareLink Patient Monitor 24950
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.