Skip to main content

CVE-2025-2907: CWE-862 Missing Authorization in Unknown Order Delivery Date

Critical
VulnerabilityCVE-2025-2907cvecve-2025-2907cwe-862cwe-352
Published: Sat Apr 26 2025 (04/26/2025, 06:00:05 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Order Delivery Date

Description

The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.

AI-Powered Analysis

AILast updated: 06/22/2025, 11:51:17 UTC

Technical Analysis

CVE-2025-2907 is a critical vulnerability affecting the WordPress plugin 'Order Delivery Date' in versions prior to 12.3.1, specifically version 2.0 as noted. The vulnerability stems from missing authorization and Cross-Site Request Forgery (CSRF) protections during the import of plugin settings. Additionally, the plugin fails to restrict updates solely to its own configuration options, allowing attackers to manipulate unrelated WordPress options. Exploiting this flaw, an attacker can modify the 'default_user_role' option to 'administrator' and enable 'users_can_register', effectively permitting arbitrary user registration with administrative privileges. This leads to a complete site takeover without requiring any authentication or user interaction. The CVSS 3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The underlying weaknesses correspond to CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). No known exploits in the wild have been reported yet, but the vulnerability's nature and severity make it a high-risk target for attackers aiming to compromise WordPress sites using this plugin. The absence of authorization checks and CSRF protections during settings import is a critical design flaw, allowing attackers to escalate privileges and gain full control over affected websites.

Potential Impact

For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a severe risk of complete website compromise. Attackers can gain administrative access remotely without authentication, enabling them to manipulate site content, steal sensitive data, deploy malware, or use the site as a pivot point for further attacks within the organization's network. This can lead to reputational damage, data breaches involving customer or employee information, and potential regulatory non-compliance under GDPR due to unauthorized data access or modification. E-commerce and service-oriented websites relying on WordPress are particularly vulnerable, as attackers could disrupt business operations or conduct fraudulent activities. The lack of user interaction or authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks targeting vulnerable sites. Given WordPress's widespread use in Europe, especially among small and medium enterprises, the impact can be extensive if timely mitigation is not applied.

Mitigation Recommendations

1. Immediate update of the Order Delivery Date plugin to version 12.3.1 or later where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin temporarily to prevent exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests attempting to import settings or modify critical options. 4. Monitor WordPress user roles and registrations for unexpected administrator accounts and disable any suspicious accounts promptly. 5. Restrict access to the WordPress admin panel by IP whitelisting or VPN to reduce exposure. 6. Regularly audit plugin permissions and configurations to ensure no unauthorized changes occur. 7. Educate site administrators about the risks of importing settings from untrusted sources and enforce strict operational procedures for plugin management. 8. Employ security plugins that provide enhanced authorization and CSRF protections as an additional layer of defense. 9. Conduct periodic vulnerability scans focusing on WordPress plugins to detect outdated or vulnerable components proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-03-28T09:37:43.776Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeec1d

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 11:51:17 AM

Last updated: 7/22/2025, 12:15:37 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats