CVE-2025-4522: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Insecure Direct Object Reference via the admin_post_donor_delete() function in versions 2.0.0 to 2.1.9. By supplying an arbitrary user_id parameter value to the wp_delete_user() function, authenticated attackers, with Subscriber-level access and above could delete arbitrary user accounts, including those of administrators.
AI Analysis
Technical Summary
CVE-2025-4522 identifies a Missing Authorization vulnerability (CWE-862) in the IDonate – Blood Donation, Request And Donor Management System WordPress plugin, specifically affecting versions 2.0.0 through 2.1.9. The flaw exists in the admin_post_donor_delete() function, which processes requests to delete donor user accounts. The vulnerability allows authenticated users with minimal privileges (Subscriber-level or higher) to supply arbitrary user_id parameters to the wp_delete_user() function without proper authorization checks. This enables attackers to delete any user account, including those with administrative privileges, leading to potential loss of administrative control over the WordPress site. The vulnerability is remotely exploitable over the network without user interaction, with low attack complexity and requiring only authenticated access. The CVSS 3.1 score of 6.5 reflects a medium severity, emphasizing high impact on integrity (user account deletion) but no direct impact on confidentiality or availability. No patches or known exploits are currently available, but the risk remains significant for organizations relying on this plugin for critical blood donation management functions. The plugin’s role in managing sensitive healthcare data and user roles increases the potential operational impact of this vulnerability.
Potential Impact
For European organizations, particularly those in healthcare, blood donation, and nonprofit sectors using the IDonate plugin, this vulnerability poses a risk of unauthorized deletion of user accounts, including administrators. This can lead to loss of administrative control, disruption of blood donation management workflows, and potential denial of service for legitimate users. The integrity of user data and system management is compromised, potentially delaying critical healthcare operations. Additionally, unauthorized account deletions could facilitate further attacks or data manipulation by adversaries who gain control over the system. Given the sensitive nature of healthcare data and the importance of blood donation systems, this vulnerability could undermine trust and operational reliability. Organizations may face regulatory scrutiny under GDPR if the disruption leads to data handling failures or service outages affecting personal data processing.
Mitigation Recommendations
To mitigate CVE-2025-4522, organizations should immediately restrict access to the admin_post_donor_delete() function to only trusted administrative roles by implementing strict authorization checks. Review and harden role-based access controls within WordPress and the plugin configuration to ensure Subscriber-level users cannot perform privileged actions. Monitor logs for unusual user deletion activity and implement alerting for account deletions, especially of administrators. If possible, temporarily disable the plugin or the vulnerable functionality until a vendor patch is released. Conduct regular backups of user data and site configurations to enable recovery from unauthorized deletions. Engage with the plugin vendor or community to obtain or develop patches addressing the missing authorization. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-4522: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
Description
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Insecure Direct Object Reference via the admin_post_donor_delete() function in versions 2.0.0 to 2.1.9. By supplying an arbitrary user_id parameter value to the wp_delete_user() function, authenticated attackers, with Subscriber-level access and above could delete arbitrary user accounts, including those of administrators.
AI-Powered Analysis
Technical Analysis
CVE-2025-4522 identifies a Missing Authorization vulnerability (CWE-862) in the IDonate – Blood Donation, Request And Donor Management System WordPress plugin, specifically affecting versions 2.0.0 through 2.1.9. The flaw exists in the admin_post_donor_delete() function, which processes requests to delete donor user accounts. The vulnerability allows authenticated users with minimal privileges (Subscriber-level or higher) to supply arbitrary user_id parameters to the wp_delete_user() function without proper authorization checks. This enables attackers to delete any user account, including those with administrative privileges, leading to potential loss of administrative control over the WordPress site. The vulnerability is remotely exploitable over the network without user interaction, with low attack complexity and requiring only authenticated access. The CVSS 3.1 score of 6.5 reflects a medium severity, emphasizing high impact on integrity (user account deletion) but no direct impact on confidentiality or availability. No patches or known exploits are currently available, but the risk remains significant for organizations relying on this plugin for critical blood donation management functions. The plugin’s role in managing sensitive healthcare data and user roles increases the potential operational impact of this vulnerability.
Potential Impact
For European organizations, particularly those in healthcare, blood donation, and nonprofit sectors using the IDonate plugin, this vulnerability poses a risk of unauthorized deletion of user accounts, including administrators. This can lead to loss of administrative control, disruption of blood donation management workflows, and potential denial of service for legitimate users. The integrity of user data and system management is compromised, potentially delaying critical healthcare operations. Additionally, unauthorized account deletions could facilitate further attacks or data manipulation by adversaries who gain control over the system. Given the sensitive nature of healthcare data and the importance of blood donation systems, this vulnerability could undermine trust and operational reliability. Organizations may face regulatory scrutiny under GDPR if the disruption leads to data handling failures or service outages affecting personal data processing.
Mitigation Recommendations
To mitigate CVE-2025-4522, organizations should immediately restrict access to the admin_post_donor_delete() function to only trusted administrative roles by implementing strict authorization checks. Review and harden role-based access controls within WordPress and the plugin configuration to ensure Subscriber-level users cannot perform privileged actions. Monitor logs for unusual user deletion activity and implement alerting for account deletions, especially of administrators. If possible, temporarily disable the plugin or the vulnerable functionality until a vendor patch is released. Conduct regular backups of user data and site configurations to enable recovery from unauthorized deletions. Engage with the plugin vendor or community to obtain or develop patches addressing the missing authorization. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-09T21:42:43.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d79bf3ea13e495ec0caf4
Added to database: 11/7/2025, 4:46:55 AM
Last enriched: 11/7/2025, 4:47:31 AM
Last updated: 11/10/2025, 4:03:19 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12929: SQL Injection in SourceCodester Survey Application System
MediumCVE-2025-12928: SQL Injection in code-projects Online Job Search Engine
MediumCVE-2025-12868: CWE-603 Use of Client-Side Authentication in CyberTutor New Site Server
CriticalCVE-2025-12867: CWE-434 Unrestricted Upload of File with Dangerous Type in Hundred Plus EIP Plus
HighCVE-2025-12927: SQL Injection in DedeBIZ
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.