First published: Wed Mar 12 2025(Updated: )
The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_data action in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to download all of a site's post content when WooCommerce is installed.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WP Crowdfunding | <=2.1.13 | |
Themeum WP Crowdfunding | <=2.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1508 is considered a high severity vulnerability due to the risk of unauthorized data access.
To fix CVE-2025-1508, you should update the WP Crowdfunding plugin to the latest version beyond 2.1.13.
CVE-2025-1508 affects all versions of the WP Crowdfunding plugin up to and including version 2.1.13.
CVE-2025-1508 can be exploited by authenticated attackers with subscriber-level access and above.
CVE-2025-1508 allows attackers to access sensitive data due to a missing capability check in the download_data action.