CVE-2025-13921
Unknown Unknown - Not Provided
Authorization Bypass in weDocs Plugin Allows Documentation Modification

Publication date: 2026-01-23

Last updated on: 2026-01-23

Assigner: Wordfence

Description
The weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot plugin for WordPress is vulnerable to unauthorized modification or loss of data due to a missing capability check on the 'wedocs_user_documentation_handling_capabilities' function in all versions up to, and including, 2.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit any documentation post. The vulnerability was partially patched in version 2.1.16.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-01-23
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wedevs wedocs to 2.1.16 (inc)
wedevs wedocs 2.1.17
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the WeDocs WordPress plugin allows authenticated users with Subscriber-level access or higher to modify any documentation post without proper authorization. This is due to a missing capability check in the 'wedocs_user_documentation_handling_capabilities' function in versions up to and including 2.1.16. Essentially, users who should have limited permissions can edit documentation posts they are not supposed to, potentially leading to unauthorized content changes. The issue was partially fixed in version 2.1.16. [2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing low-privileged authenticated users (Subscribers and above) to edit any documentation post. This unauthorized modification can lead to misinformation, defacement, or loss of important documentation content. It undermines the integrity and reliability of your documentation, potentially confusing users or exposing incorrect information. Since the vulnerability does not affect confidentiality or availability directly, the main impact is on the integrity of documentation data. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized modification of documentation posts by authenticated users with Subscriber-level access or higher due to missing capability checks in the 'wedocs_user_documentation_handling_capabilities' function. To detect exploitation attempts or presence of this vulnerability on your system, you can: 1. Check the version of the WeDocs plugin installed; versions up to and including 2.1.16 are vulnerable. 2. Monitor WordPress user activity logs for unexpected edits to documentation posts by Subscriber-level users or roles that should not have editing capabilities. 3. Use WordPress CLI commands to check the installed plugin version: `wp plugin get wedocs --field=version` 4. Review user roles and capabilities related to documentation handling, especially if Subscribers have edit permissions on docs. 5. Audit recent changes to documentation posts via database queries or WordPress audit logs, focusing on edits by low-privilege users. Specific commands: - `wp plugin get wedocs --field=version` to check plugin version. - Query the WordPress database to find recent edits to documentation posts by Subscriber users, e.g.: `SELECT post_author, post_modified, post_title FROM wp_posts WHERE post_type = 'docs' ORDER BY post_modified DESC LIMIT 20;` - Check user capabilities assigned to Subscribers: `wp user get <user_id> --field=roles` and inspect capabilities via custom code or plugins. Note: No direct detection commands are provided in the resources, but these steps are inferred from the vulnerability context and plugin capability management described. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the WeDocs plugin to version 2.1.17 or later, as version 2.1.16 only partially patched the vulnerability. The update includes enhanced capability management restricting documentation editing capabilities to administrators and editors only, preventing unauthorized edits by Subscribers. Steps: 1. Backup your WordPress site and database. 2. Update the WeDocs plugin to version 2.1.17 or newer via the WordPress admin dashboard or using WP-CLI: `wp plugin update wedocs` 3. Verify that user roles and capabilities are correctly set so that Subscribers do not have documentation editing permissions. 4. Monitor user activity for any suspicious changes. These steps ensure the missing capability check is enforced, preventing unauthorized modifications. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources and context do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart