Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4522: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System

0
Medium
VulnerabilityCVE-2025-4522cvecve-2025-4522cwe-862
Published: Fri Nov 07 2025 (11/07/2025, 04:28:54 UTC)
Source: CVE Database V5
Vendor/Project: themeatelier
Product: IDonate – Blood Donation, Request And Donor Management System

Description

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Insecure Direct Object Reference via the admin_post_donor_delete() function in versions 2.0.0 to 2.1.9. By supplying an arbitrary user_id parameter value to the wp_delete_user() function, authenticated attackers, with Subscriber-level access and above could delete arbitrary user accounts, including those of administrators.

AI-Powered Analysis

AILast updated: 11/14/2025, 04:52:06 UTC

Technical Analysis

CVE-2025-4522 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the IDonate – Blood Donation, Request And Donor Management System plugin for WordPress, specifically versions 2.0.0 through 2.1.9. The flaw exists in the admin_post_donor_delete() function, which handles user deletion requests. This function fails to properly verify that the authenticated user has the necessary permissions to delete arbitrary user accounts. As a result, an attacker with only Subscriber-level privileges or higher can supply an arbitrary user_id parameter to the wp_delete_user() function, causing the deletion of any user account, including administrators. This represents an Insecure Direct Object Reference (IDOR) vulnerability, where direct access to internal objects (user accounts) is not properly authorized. The vulnerability has a CVSS 3.1 base score of 6.5 (medium severity), with an attack vector of network, low attack complexity, requiring privileges (authenticated user), no user interaction, and impacts integrity but not confidentiality or availability. The absence of known exploits in the wild suggests limited current exploitation, but the potential for privilege escalation and disruption of administrative control is significant. The plugin is used in managing blood donation and donor requests, making it critical in healthcare-related WordPress sites. The vulnerability could allow attackers to disrupt operations by deleting key user accounts, potentially locking out legitimate administrators and compromising system integrity.

Potential Impact

For European organizations, particularly those in the healthcare sector using the IDonate plugin, this vulnerability poses a risk of unauthorized deletion of user accounts, including administrators. This can lead to loss of administrative control, disruption of blood donation management operations, and potential denial of service to legitimate users. The integrity of user data and system management is compromised, which could affect patient and donor data handling indirectly by disabling or disrupting system administration. Given the critical nature of healthcare services and the increasing reliance on digital platforms in Europe, such disruptions could have operational and reputational consequences. Furthermore, unauthorized account deletions could be leveraged as part of a broader attack chain to escalate privileges or cause persistent denial of service. The medium severity rating reflects the need for timely remediation to prevent exploitation. Organizations with limited IT security resources or those slow to apply updates are particularly vulnerable. The impact is heightened in countries with high adoption of WordPress in healthcare and blood donation services, where such plugins are more likely to be deployed.

Mitigation Recommendations

1. Apply patches or updates from the plugin vendor as soon as they become available to fix the authorization flaw. 2. If patches are not yet available, restrict access to the plugin's administrative functions by limiting Subscriber-level and other low-privilege user capabilities using WordPress role management plugins or custom code. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to invoke the admin_post_donor_delete() function with arbitrary user_id parameters. 4. Monitor WordPress logs and audit trails for unusual user deletion activities, especially those initiated by low-privilege accounts. 5. Conduct regular reviews of user accounts and permissions to quickly detect unauthorized deletions or changes. 6. Consider temporarily disabling or replacing the plugin if it is not essential or if a patch is not available, to reduce exposure. 7. Educate administrators and users about the risk and encourage strong authentication practices to reduce the risk of compromised accounts being used to exploit this vulnerability. 8. Employ network segmentation and least privilege principles to limit the impact of any successful exploitation within the IT environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-05-09T21:42:43.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d79bf3ea13e495ec0caf4

Added to database: 11/7/2025, 4:46:55 AM

Last enriched: 11/14/2025, 4:52:06 AM

Last updated: 12/23/2025, 7:47:18 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats