CVE-2025-13921
Authorization Bypass in weDocs Plugin Allows Documentation Modification
Publication date: 2026-01-23
Last updated on: 2026-01-23
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wedevs | wedocs | to 2.1.16 (inc) |
| wedevs | wedocs | 2.1.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the WeDocs WordPress plugin allows authenticated users with Subscriber-level access or higher to modify any documentation post without proper authorization. This is due to a missing capability check in the 'wedocs_user_documentation_handling_capabilities' function in versions up to and including 2.1.16. Essentially, users who should have limited permissions can edit documentation posts they are not supposed to, potentially leading to unauthorized content changes. The issue was partially fixed in version 2.1.16. [2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing low-privileged authenticated users (Subscribers and above) to edit any documentation post. This unauthorized modification can lead to misinformation, defacement, or loss of important documentation content. It undermines the integrity and reliability of your documentation, potentially confusing users or exposing incorrect information. Since the vulnerability does not affect confidentiality or availability directly, the main impact is on the integrity of documentation data. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unauthorized modification of documentation posts by authenticated users with Subscriber-level access or higher due to missing capability checks in the 'wedocs_user_documentation_handling_capabilities' function. To detect exploitation attempts or presence of this vulnerability on your system, you can: 1. Check the version of the WeDocs plugin installed; versions up to and including 2.1.16 are vulnerable. 2. Monitor WordPress user activity logs for unexpected edits to documentation posts by Subscriber-level users or roles that should not have editing capabilities. 3. Use WordPress CLI commands to check the installed plugin version: `wp plugin get wedocs --field=version` 4. Review user roles and capabilities related to documentation handling, especially if Subscribers have edit permissions on docs. 5. Audit recent changes to documentation posts via database queries or WordPress audit logs, focusing on edits by low-privilege users. Specific commands: - `wp plugin get wedocs --field=version` to check plugin version. - Query the WordPress database to find recent edits to documentation posts by Subscriber users, e.g.: `SELECT post_author, post_modified, post_title FROM wp_posts WHERE post_type = 'docs' ORDER BY post_modified DESC LIMIT 20;` - Check user capabilities assigned to Subscribers: `wp user get <user_id> --field=roles` and inspect capabilities via custom code or plugins. Note: No direct detection commands are provided in the resources, but these steps are inferred from the vulnerability context and plugin capability management described. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the WeDocs plugin to version 2.1.17 or later, as version 2.1.16 only partially patched the vulnerability. The update includes enhanced capability management restricting documentation editing capabilities to administrators and editors only, preventing unauthorized edits by Subscribers. Steps: 1. Backup your WordPress site and database. 2. Update the WeDocs plugin to version 2.1.17 or newer via the WordPress admin dashboard or using WP-CLI: `wp plugin update wedocs` 3. Verify that user roles and capabilities are correctly set so that Subscribers do not have documentation editing permissions. 4. Monitor user activity for any suspicious changes. These steps ensure the missing capability check is enforced, preventing unauthorized modifications. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources and context do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.