CVE-2025-4523: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themeatelier IDonate – Blood Donation, Request And Donor Management System
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose an administrator’s username, email address, and all donor fields.
AI Analysis
Technical Summary
CVE-2025-4523 is a medium-severity vulnerability affecting the IDonate – Blood Donation, Request And Donor Management System WordPress plugin developed by themeatelier, specifically versions 2.0.0 through 2.1.9. The vulnerability arises from a missing capability check in the admin_donor_profile_view() function, which is responsible for displaying donor profile information within the administrative interface. Due to this missing authorization control, any authenticated user with Subscriber-level privileges or higher can access sensitive administrator data, including usernames, email addresses, and all donor-related fields. This constitutes an exposure of sensitive information (CWE-200) to unauthorized actors. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). Although no known exploits are reported in the wild yet, the vulnerability could be leveraged by attackers who have gained low-level authenticated access to the WordPress site, such as through phishing or weak credential reuse. The exposure of administrator credentials and donor data could facilitate further attacks, including privilege escalation, targeted phishing, or identity theft. The plugin is used to manage blood donation requests and donor information, making the confidentiality of this data critical for privacy and regulatory compliance. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for administrators to implement compensating controls or monitor for suspicious activity.
Potential Impact
For European organizations, especially healthcare providers, NGOs, or blood donation centers using the IDonate plugin, this vulnerability poses significant privacy and compliance risks. Exposure of administrator credentials and donor personal data could violate GDPR requirements, leading to legal penalties and reputational damage. The sensitive nature of donor information, including potentially health-related data, heightens the impact. Attackers exploiting this vulnerability could gain insights to launch further attacks within the organization’s network or target donors with phishing or social engineering campaigns. Additionally, unauthorized disclosure of donor data could undermine public trust in blood donation programs. The medium CVSS score reflects that while the vulnerability requires authenticated access, the ease of exploitation and the sensitivity of data exposed make it a notable threat. European organizations must consider the regulatory implications and the criticality of maintaining donor confidentiality when assessing risk.
Mitigation Recommendations
1. Immediate mitigation should include restricting Subscriber-level user registrations or auditing existing users to ensure only trusted individuals have such access. 2. Implement strict access control policies and monitor user activities for anomalous access patterns to donor profiles. 3. If possible, temporarily disable the IDonate plugin or restrict its usage until a vendor patch is released. 4. Apply web application firewall (WAF) rules to detect and block suspicious requests targeting the admin_donor_profile_view() function or related endpoints. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins, especially those handling sensitive data. 6. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 7. Engage with the vendor or community to obtain or develop patches addressing the missing capability check. 8. Educate administrative and donor management staff about the risks and signs of potential exploitation. 9. Ensure comprehensive logging and alerting are in place to detect unauthorized data access attempts. These steps go beyond generic advice by focusing on user privilege management, monitoring, and compensating controls specific to the plugin’s functionality and the nature of the data involved.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-4523: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in themeatelier IDonate – Blood Donation, Request And Donor Management System
Description
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose an administrator’s username, email address, and all donor fields.
AI-Powered Analysis
Technical Analysis
CVE-2025-4523 is a medium-severity vulnerability affecting the IDonate – Blood Donation, Request And Donor Management System WordPress plugin developed by themeatelier, specifically versions 2.0.0 through 2.1.9. The vulnerability arises from a missing capability check in the admin_donor_profile_view() function, which is responsible for displaying donor profile information within the administrative interface. Due to this missing authorization control, any authenticated user with Subscriber-level privileges or higher can access sensitive administrator data, including usernames, email addresses, and all donor-related fields. This constitutes an exposure of sensitive information (CWE-200) to unauthorized actors. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). Although no known exploits are reported in the wild yet, the vulnerability could be leveraged by attackers who have gained low-level authenticated access to the WordPress site, such as through phishing or weak credential reuse. The exposure of administrator credentials and donor data could facilitate further attacks, including privilege escalation, targeted phishing, or identity theft. The plugin is used to manage blood donation requests and donor information, making the confidentiality of this data critical for privacy and regulatory compliance. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for administrators to implement compensating controls or monitor for suspicious activity.
Potential Impact
For European organizations, especially healthcare providers, NGOs, or blood donation centers using the IDonate plugin, this vulnerability poses significant privacy and compliance risks. Exposure of administrator credentials and donor personal data could violate GDPR requirements, leading to legal penalties and reputational damage. The sensitive nature of donor information, including potentially health-related data, heightens the impact. Attackers exploiting this vulnerability could gain insights to launch further attacks within the organization’s network or target donors with phishing or social engineering campaigns. Additionally, unauthorized disclosure of donor data could undermine public trust in blood donation programs. The medium CVSS score reflects that while the vulnerability requires authenticated access, the ease of exploitation and the sensitivity of data exposed make it a notable threat. European organizations must consider the regulatory implications and the criticality of maintaining donor confidentiality when assessing risk.
Mitigation Recommendations
1. Immediate mitigation should include restricting Subscriber-level user registrations or auditing existing users to ensure only trusted individuals have such access. 2. Implement strict access control policies and monitor user activities for anomalous access patterns to donor profiles. 3. If possible, temporarily disable the IDonate plugin or restrict its usage until a vendor patch is released. 4. Apply web application firewall (WAF) rules to detect and block suspicious requests targeting the admin_donor_profile_view() function or related endpoints. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins, especially those handling sensitive data. 6. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 7. Engage with the vendor or community to obtain or develop patches addressing the missing capability check. 8. Educate administrative and donor management staff about the risks and signs of potential exploitation. 9. Ensure comprehensive logging and alerting are in place to detect unauthorized data access attempts. These steps go beyond generic advice by focusing on user privilege management, monitoring, and compensating controls specific to the plugin’s functionality and the nature of the data involved.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-09T22:25:24.439Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688c46f1ad5a09ad00c4fd9d
Added to database: 8/1/2025, 4:47:45 AM
Last enriched: 8/1/2025, 5:03:44 AM
Last updated: 8/2/2025, 4:32:56 AM
Views: 10
Related Threats
CVE-2025-8468: SQL Injection in code-projects Wazifa System
MediumCVE-2025-7710: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Brave Brave Conversion Engine (PRO)
CriticalCVE-2025-7500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in oceanwp Ocean Social Sharing
MediumCVE-2025-8467: SQL Injection in code-projects Wazifa System
MediumCVE-2025-8488: CWE-862 Missing Authorization in brainstormforce Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.