Skip to main content

CVE-2025-4523: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themeatelier IDonate – Blood Donation, Request And Donor Management System

Medium
VulnerabilityCVE-2025-4523cvecve-2025-4523cwe-200
Published: Fri Aug 01 2025 (08/01/2025, 04:24:29 UTC)
Source: CVE Database V5
Vendor/Project: themeatelier
Product: IDonate – Blood Donation, Request And Donor Management System

Description

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose an administrator’s username, email address, and all donor fields.

AI-Powered Analysis

AILast updated: 08/01/2025, 05:03:44 UTC

Technical Analysis

CVE-2025-4523 is a medium-severity vulnerability affecting the IDonate – Blood Donation, Request And Donor Management System WordPress plugin developed by themeatelier, specifically versions 2.0.0 through 2.1.9. The vulnerability arises from a missing capability check in the admin_donor_profile_view() function, which is responsible for displaying donor profile information within the administrative interface. Due to this missing authorization control, any authenticated user with Subscriber-level privileges or higher can access sensitive administrator data, including usernames, email addresses, and all donor-related fields. This constitutes an exposure of sensitive information (CWE-200) to unauthorized actors. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). Although no known exploits are reported in the wild yet, the vulnerability could be leveraged by attackers who have gained low-level authenticated access to the WordPress site, such as through phishing or weak credential reuse. The exposure of administrator credentials and donor data could facilitate further attacks, including privilege escalation, targeted phishing, or identity theft. The plugin is used to manage blood donation requests and donor information, making the confidentiality of this data critical for privacy and regulatory compliance. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for administrators to implement compensating controls or monitor for suspicious activity.

Potential Impact

For European organizations, especially healthcare providers, NGOs, or blood donation centers using the IDonate plugin, this vulnerability poses significant privacy and compliance risks. Exposure of administrator credentials and donor personal data could violate GDPR requirements, leading to legal penalties and reputational damage. The sensitive nature of donor information, including potentially health-related data, heightens the impact. Attackers exploiting this vulnerability could gain insights to launch further attacks within the organization’s network or target donors with phishing or social engineering campaigns. Additionally, unauthorized disclosure of donor data could undermine public trust in blood donation programs. The medium CVSS score reflects that while the vulnerability requires authenticated access, the ease of exploitation and the sensitivity of data exposed make it a notable threat. European organizations must consider the regulatory implications and the criticality of maintaining donor confidentiality when assessing risk.

Mitigation Recommendations

1. Immediate mitigation should include restricting Subscriber-level user registrations or auditing existing users to ensure only trusted individuals have such access. 2. Implement strict access control policies and monitor user activities for anomalous access patterns to donor profiles. 3. If possible, temporarily disable the IDonate plugin or restrict its usage until a vendor patch is released. 4. Apply web application firewall (WAF) rules to detect and block suspicious requests targeting the admin_donor_profile_view() function or related endpoints. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins, especially those handling sensitive data. 6. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 7. Engage with the vendor or community to obtain or develop patches addressing the missing capability check. 8. Educate administrative and donor management staff about the risks and signs of potential exploitation. 9. Ensure comprehensive logging and alerting are in place to detect unauthorized data access attempts. These steps go beyond generic advice by focusing on user privilege management, monitoring, and compensating controls specific to the plugin’s functionality and the nature of the data involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-09T22:25:24.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688c46f1ad5a09ad00c4fd9d

Added to database: 8/1/2025, 4:47:45 AM

Last enriched: 8/1/2025, 5:03:44 AM

Last updated: 8/2/2025, 4:32:56 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats