CVE-2025-3851: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themesgrove Download Manager and Payment Form WordPress Plugin – WP SmartPay
The Download Manager and Payment Form WordPress Plugin – WP SmartPay plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions 1.1.0 to 2.7.13 via the show() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's data like email address, name, and notes.
AI Analysis
Technical Summary
CVE-2025-3851 is a medium-severity vulnerability affecting the Download Manager and Payment Form WordPress Plugin – WP SmartPay, developed by themesgrove. The vulnerability arises from an Insecure Direct Object Reference (IDOR) issue in the plugin's show() function, which lacks proper validation of a user-controlled key parameter. This flaw allows authenticated users with Subscriber-level privileges or higher to access sensitive information belonging to other users, including email addresses, names, and notes. The affected versions range from 1.1.0 to 2.7.13, with the vulnerability specifically confirmed in version 1.1.0. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). No public exploits have been reported yet, and no patches are currently linked, indicating that users should be vigilant for forthcoming updates. The issue stems from insufficient access control checks, allowing attackers to manipulate the key parameter to retrieve data of other users, violating data privacy principles and potentially exposing personally identifiable information (PII).
Potential Impact
For European organizations, this vulnerability poses a privacy risk, especially under the stringent requirements of the GDPR, which mandates the protection of personal data such as email addresses and names. Unauthorized disclosure of user information could lead to regulatory penalties, reputational damage, and loss of customer trust. Organizations using the WP SmartPay plugin on their WordPress sites may inadvertently expose customer or employee data to other authenticated users, which could be exploited for social engineering or further attacks. While the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant. The impact is heightened for organizations handling sensitive or regulated data, including e-commerce platforms, financial services, and healthcare providers. The medium severity score suggests the threat is notable but not critical; however, the ease of exploitation by low-privilege authenticated users increases the risk profile.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP SmartPay plugin. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting access to trusted users only. Implementing strict role-based access controls and minimizing the number of users with Subscriber-level or higher privileges can reduce exposure. Monitoring logs for unusual access patterns to the show() function or suspicious parameter usage can help detect exploitation attempts. Organizations should also ensure that WordPress and all plugins are kept up to date and subscribe to vendor or security mailing lists for timely patch notifications. Additionally, applying Web Application Firewall (WAF) rules to detect and block abnormal requests targeting the vulnerable parameter may provide interim protection. Finally, reviewing and enhancing overall data access validation within custom or third-party plugins is recommended to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3851: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themesgrove Download Manager and Payment Form WordPress Plugin – WP SmartPay
Description
The Download Manager and Payment Form WordPress Plugin – WP SmartPay plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions 1.1.0 to 2.7.13 via the show() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's data like email address, name, and notes.
AI-Powered Analysis
Technical Analysis
CVE-2025-3851 is a medium-severity vulnerability affecting the Download Manager and Payment Form WordPress Plugin – WP SmartPay, developed by themesgrove. The vulnerability arises from an Insecure Direct Object Reference (IDOR) issue in the plugin's show() function, which lacks proper validation of a user-controlled key parameter. This flaw allows authenticated users with Subscriber-level privileges or higher to access sensitive information belonging to other users, including email addresses, names, and notes. The affected versions range from 1.1.0 to 2.7.13, with the vulnerability specifically confirmed in version 1.1.0. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). No public exploits have been reported yet, and no patches are currently linked, indicating that users should be vigilant for forthcoming updates. The issue stems from insufficient access control checks, allowing attackers to manipulate the key parameter to retrieve data of other users, violating data privacy principles and potentially exposing personally identifiable information (PII).
Potential Impact
For European organizations, this vulnerability poses a privacy risk, especially under the stringent requirements of the GDPR, which mandates the protection of personal data such as email addresses and names. Unauthorized disclosure of user information could lead to regulatory penalties, reputational damage, and loss of customer trust. Organizations using the WP SmartPay plugin on their WordPress sites may inadvertently expose customer or employee data to other authenticated users, which could be exploited for social engineering or further attacks. While the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant. The impact is heightened for organizations handling sensitive or regulated data, including e-commerce platforms, financial services, and healthcare providers. The medium severity score suggests the threat is notable but not critical; however, the ease of exploitation by low-privilege authenticated users increases the risk profile.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP SmartPay plugin. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting access to trusted users only. Implementing strict role-based access controls and minimizing the number of users with Subscriber-level or higher privileges can reduce exposure. Monitoring logs for unusual access patterns to the show() function or suspicious parameter usage can help detect exploitation attempts. Organizations should also ensure that WordPress and all plugins are kept up to date and subscribe to vendor or security mailing lists for timely patch notifications. Additionally, applying Web Application Firewall (WAF) rules to detect and block abnormal requests targeting the vulnerable parameter may provide interim protection. Finally, reviewing and enhancing overall data access validation within custom or third-party plugins is recommended to prevent similar issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-21T13:50:28.208Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd99c6
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 2:24:50 PM
Last updated: 7/30/2025, 2:34:55 AM
Views: 11
Related Threats
CVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9012: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.