CVE-2025-13029
📋 TL;DR
The Knowband Mobile App Builder WordPress plugin before version 3.0.0 has an authorization vulnerability in its REST API that allows unauthenticated attackers to delete arbitrary users. This affects WordPress sites using the vulnerable plugin version. Attackers can exploit this without any authentication or special privileges.
💻 Affected Systems
- Knowband Mobile App Builder WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers delete all users including administrators, causing complete loss of administrative access and potential site takeover.
Likely Case
Attackers delete key administrative or content creator accounts, disrupting site operations and requiring manual restoration.
If Mitigated
With proper access controls and monitoring, unauthorized deletion attempts are blocked and logged for investigation.
🎯 Exploit Status
The vulnerability is simple to exploit via HTTP requests to the REST API endpoint without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.0
Vendor Advisory: https://wpscan.com/vulnerability/22344534-cd36-4817-b683-c0af55759e01/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Knowband Mobile App Builder. 4. Update to version 3.0.0 or later. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable REST API endpoint
allTemporarily disable the vulnerable REST API endpoint until patching is possible.
Add to WordPress theme functions.php: add_filter('rest_authentication_errors', 'disable_rest_api_for_guests'); function disable_rest_api_for_guests($result) { if (!is_user_logged_in()) { return new WP_Error('rest_forbidden', 'REST API access restricted.', array('status' => 401)); } return $result; }
Deactivate plugin
linuxTemporarily deactivate the plugin if not essential for site functionality.
wp plugin deactivate knowband-mobile-app-builder
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block unauthorized REST API user deletion requests.
- Enable detailed logging of all user deletion attempts and monitor for suspicious activity.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Knowband Mobile App Builder version. If version is below 3.0.0, the system is vulnerable.
Check Version:
wp plugin list --name=knowband-mobile-app-builder --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 3.0.0 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-json/knowband/v1/delete_user endpoint from unauthenticated IPs
- Multiple user deletion events in short timeframes
- Failed authentication attempts followed by user deletion requests
Network Indicators:
- Unusual spikes in REST API traffic to user management endpoints
- HTTP 200 responses to user deletion requests from unauthenticated sources
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-json/knowband/v1/delete_user" OR message="user deleted") AND NOT user_authenticated=true