CVE-2025-4521: CWE-285 Improper Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to hijack any account by reassigning its email address (via the donor_id they supply) and then triggering a password reset, ultimately granting themselves full administrator privileges.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-4521 affects the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, specifically versions 2.1.5 through 2.1.9. It is categorized under CWE-285, indicating improper authorization. The root cause is a missing capability check in the idonate_donor_profile() function, which is responsible for handling donor profile updates. Authenticated users with minimal privileges (Subscriber-level or above) can exploit this flaw by supplying a donor_id parameter to reassign the email address of any user account. Once the email is reassigned, the attacker can initiate a password reset process, effectively taking over the targeted account. This attack path does not require user interaction beyond authentication, and the vulnerability is remotely exploitable over the network. The CVSS v3.1 score is 8.8 (high), reflecting the critical impact on confidentiality, integrity, and availability, as the attacker gains full administrative control over the WordPress site. The plugin is typically used by organizations managing blood donation and donor requests, which may contain sensitive personal and health data. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability's nature suggests it could be weaponized quickly once publicized.
Potential Impact
For European organizations, the impact of this vulnerability is significant. Blood donation and healthcare-related entities using the IDonate plugin risk unauthorized administrative access, which can lead to the exposure of sensitive donor personal and medical information, violating GDPR and other privacy regulations. Full admin control allows attackers to manipulate website content, disrupt services, or deploy malware, potentially damaging organizational reputation and trust. Healthcare providers and NGOs involved in blood donation campaigns across Europe could face operational disruptions and legal consequences due to data breaches. The ease of exploitation from a low-privilege account increases the threat surface, especially in environments where user registration is open or loosely controlled. This vulnerability also poses risks to the integrity of donation records and requests, which are critical for patient care and emergency response coordination.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the vulnerable IDonate plugin versions 2.1.5 to 2.1.9. If an updated, patched version is released, applying it should be the top priority. In the absence of a patch, administrators should consider disabling or uninstalling the plugin temporarily. Restrict user registration and enforce strict access controls to limit Subscriber-level account creation. Implement monitoring and alerting for unusual password reset requests or email changes. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit the donor_id parameter in the idonate_donor_profile() function. Conduct regular security audits and penetration tests focusing on privilege escalation vectors. Additionally, enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover. Backup all site data and configurations regularly to enable rapid recovery if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-4521: CWE-285 Improper Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
Description
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to hijack any account by reassigning its email address (via the donor_id they supply) and then triggering a password reset, ultimately granting themselves full administrator privileges.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-4521 affects the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, specifically versions 2.1.5 through 2.1.9. It is categorized under CWE-285, indicating improper authorization. The root cause is a missing capability check in the idonate_donor_profile() function, which is responsible for handling donor profile updates. Authenticated users with minimal privileges (Subscriber-level or above) can exploit this flaw by supplying a donor_id parameter to reassign the email address of any user account. Once the email is reassigned, the attacker can initiate a password reset process, effectively taking over the targeted account. This attack path does not require user interaction beyond authentication, and the vulnerability is remotely exploitable over the network. The CVSS v3.1 score is 8.8 (high), reflecting the critical impact on confidentiality, integrity, and availability, as the attacker gains full administrative control over the WordPress site. The plugin is typically used by organizations managing blood donation and donor requests, which may contain sensitive personal and health data. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability's nature suggests it could be weaponized quickly once publicized.
Potential Impact
For European organizations, the impact of this vulnerability is significant. Blood donation and healthcare-related entities using the IDonate plugin risk unauthorized administrative access, which can lead to the exposure of sensitive donor personal and medical information, violating GDPR and other privacy regulations. Full admin control allows attackers to manipulate website content, disrupt services, or deploy malware, potentially damaging organizational reputation and trust. Healthcare providers and NGOs involved in blood donation campaigns across Europe could face operational disruptions and legal consequences due to data breaches. The ease of exploitation from a low-privilege account increases the threat surface, especially in environments where user registration is open or loosely controlled. This vulnerability also poses risks to the integrity of donation records and requests, which are critical for patient care and emergency response coordination.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the vulnerable IDonate plugin versions 2.1.5 to 2.1.9. If an updated, patched version is released, applying it should be the top priority. In the absence of a patch, administrators should consider disabling or uninstalling the plugin temporarily. Restrict user registration and enforce strict access controls to limit Subscriber-level account creation. Implement monitoring and alerting for unusual password reset requests or email changes. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit the donor_id parameter in the idonate_donor_profile() function. Conduct regular security audits and penetration tests focusing on privilege escalation vectors. Additionally, enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover. Backup all site data and configurations regularly to enable rapid recovery if compromise occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-09T20:49:15.139Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f46aea4a407a3be0b6
Added to database: 2/19/2026, 4:56:20 AM
Last enriched: 2/19/2026, 5:11:18 AM
Last updated: 2/21/2026, 12:18:04 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.