CVE-2025-11154
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2025-12-05

Assigner: WPScan

Description
The IDonate WordPress plugin before 2.1.13 does not have authorisation and CSRF when deleting users via an action handler, allowing unauthenticated attackers to delete arbitrary users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
themeatelier idonate to 2.1.13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the IDonate WordPress plugin versions before 2.1.13. It occurs because the plugin does not have proper authorization checks and lacks Cross-Site Request Forgery (CSRF) protection when deleting users via an action handler. As a result, unauthenticated attackers can send specially crafted requests to the plugin's endpoint to delete arbitrary users without permission. [1]


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing attackers to delete arbitrary users from the WordPress site without authentication. This could lead to loss of user accounts, disruption of service, potential loss of data, and unauthorized manipulation of the user base, which can affect the site's integrity and availability. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to send a crafted POST request to the WordPress site's admin-ajax.php endpoint targeting the vulnerable action handler. A sample command to test this is: curl -X POST http://example.com/wp-admin/admin-ajax.php -H "Content-Type: application/x-www-form-urlencoded" -d "action=panding_donor_action&target=delete&userid=<<INSERT_USER_ID>>" Replace <<INSERT_USER_ID>> with a valid user ID to check if the user can be deleted without authorization. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the IDonate WordPress plugin to version 2.1.13 or later, where this vulnerability has been fixed. Until the update can be applied, restrict access to the wp-admin/admin-ajax.php endpoint or implement additional access controls to prevent unauthenticated requests from triggering the vulnerable action handler. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart