CVE-2025-2907: CWE-862 Missing Authorization in Unknown Order Delivery Date
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
AI Analysis
Technical Summary
CVE-2025-2907 is a critical vulnerability affecting the WordPress plugin 'Order Delivery Date' in versions prior to 12.3.1, specifically version 2.0 as noted. The vulnerability stems from missing authorization and Cross-Site Request Forgery (CSRF) protections during the import of plugin settings. Additionally, the plugin fails to restrict updates solely to its own configuration options, allowing attackers to manipulate unrelated WordPress options. Exploiting this flaw, an attacker can modify the 'default_user_role' option to 'administrator' and enable 'users_can_register', effectively permitting arbitrary user registration with administrative privileges. This leads to a complete site takeover without requiring any authentication or user interaction. The CVSS 3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The underlying weaknesses correspond to CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). No known exploits in the wild have been reported yet, but the vulnerability's nature and severity make it a high-risk target for attackers aiming to compromise WordPress sites using this plugin. The absence of authorization checks and CSRF protections during settings import is a critical design flaw, allowing attackers to escalate privileges and gain full control over affected websites.
Potential Impact
For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a severe risk of complete website compromise. Attackers can gain administrative access remotely without authentication, enabling them to manipulate site content, steal sensitive data, deploy malware, or use the site as a pivot point for further attacks within the organization's network. This can lead to reputational damage, data breaches involving customer or employee information, and potential regulatory non-compliance under GDPR due to unauthorized data access or modification. E-commerce and service-oriented websites relying on WordPress are particularly vulnerable, as attackers could disrupt business operations or conduct fraudulent activities. The lack of user interaction or authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks targeting vulnerable sites. Given WordPress's widespread use in Europe, especially among small and medium enterprises, the impact can be extensive if timely mitigation is not applied.
Mitigation Recommendations
1. Immediate update of the Order Delivery Date plugin to version 12.3.1 or later where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin temporarily to prevent exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests attempting to import settings or modify critical options. 4. Monitor WordPress user roles and registrations for unexpected administrator accounts and disable any suspicious accounts promptly. 5. Restrict access to the WordPress admin panel by IP whitelisting or VPN to reduce exposure. 6. Regularly audit plugin permissions and configurations to ensure no unauthorized changes occur. 7. Educate site administrators about the risks of importing settings from untrusted sources and enforce strict operational procedures for plugin management. 8. Employ security plugins that provide enhanced authorization and CSRF protections as an additional layer of defense. 9. Conduct periodic vulnerability scans focusing on WordPress plugins to detect outdated or vulnerable components proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-2907: CWE-862 Missing Authorization in Unknown Order Delivery Date
Description
The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
AI-Powered Analysis
Technical Analysis
CVE-2025-2907 is a critical vulnerability affecting the WordPress plugin 'Order Delivery Date' in versions prior to 12.3.1, specifically version 2.0 as noted. The vulnerability stems from missing authorization and Cross-Site Request Forgery (CSRF) protections during the import of plugin settings. Additionally, the plugin fails to restrict updates solely to its own configuration options, allowing attackers to manipulate unrelated WordPress options. Exploiting this flaw, an attacker can modify the 'default_user_role' option to 'administrator' and enable 'users_can_register', effectively permitting arbitrary user registration with administrative privileges. This leads to a complete site takeover without requiring any authentication or user interaction. The CVSS 3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of remote exploitation over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The underlying weaknesses correspond to CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). No known exploits in the wild have been reported yet, but the vulnerability's nature and severity make it a high-risk target for attackers aiming to compromise WordPress sites using this plugin. The absence of authorization checks and CSRF protections during settings import is a critical design flaw, allowing attackers to escalate privileges and gain full control over affected websites.
Potential Impact
For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a severe risk of complete website compromise. Attackers can gain administrative access remotely without authentication, enabling them to manipulate site content, steal sensitive data, deploy malware, or use the site as a pivot point for further attacks within the organization's network. This can lead to reputational damage, data breaches involving customer or employee information, and potential regulatory non-compliance under GDPR due to unauthorized data access or modification. E-commerce and service-oriented websites relying on WordPress are particularly vulnerable, as attackers could disrupt business operations or conduct fraudulent activities. The lack of user interaction or authentication requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks targeting vulnerable sites. Given WordPress's widespread use in Europe, especially among small and medium enterprises, the impact can be extensive if timely mitigation is not applied.
Mitigation Recommendations
1. Immediate update of the Order Delivery Date plugin to version 12.3.1 or later where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin temporarily to prevent exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests attempting to import settings or modify critical options. 4. Monitor WordPress user roles and registrations for unexpected administrator accounts and disable any suspicious accounts promptly. 5. Restrict access to the WordPress admin panel by IP whitelisting or VPN to reduce exposure. 6. Regularly audit plugin permissions and configurations to ensure no unauthorized changes occur. 7. Educate site administrators about the risks of importing settings from untrusted sources and enforce strict operational procedures for plugin management. 8. Employ security plugins that provide enhanced authorization and CSRF protections as an additional layer of defense. 9. Conduct periodic vulnerability scans focusing on WordPress plugins to detect outdated or vulnerable components proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-03-28T09:37:43.776Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbeec1d
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/22/2025, 11:51:17 AM
Last updated: 1/7/2026, 5:23:38 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.