CVE-2025-13092

5.3 MEDIUM

📋 TL;DR

The Devs CRM WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to access private user data through a REST API endpoint. This affects all WordPress sites using Devs CRM plugin versions 1.1.8 and earlier. Attackers can retrieve sensitive information including password hashes.

💻 Affected Systems

Products:
  • Devs CRM – Manage tasks, attendance and teams all together WordPress plugin
Versions: All versions up to and including 1.1.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration. Any WordPress site with the vulnerable plugin version is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user accounts through password hash cracking, leading to unauthorized access, data theft, and potential privilege escalation within the WordPress site.

🟠

Likely Case

Unauthorized access to user data including names, email addresses, and password hashes, potentially enabling credential stuffing attacks against users who reuse passwords.

🟢

If Mitigated

Limited impact if strong password policies are enforced, password hashes are properly salted, and multi-factor authentication is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to the vulnerable endpoint. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.9 or later

Vendor Advisory: https://wordpress.org/plugins/devs-crm/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Devs CRM plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and delete plugin until patch is released

🔧 Temporary Workarounds

Block vulnerable API endpoint

all

Add .htaccess rule to block access to the vulnerable REST API endpoint

# Add to .htaccess file in WordPress root directory
RewriteEngine On
RewriteRule ^wp-json/devs-crm/v1/attendances - [F,L]

Disable plugin

linux

Temporarily disable the Devs CRM plugin until patched

wp plugin deactivate devs-crm

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to /wp-json/devs-crm/v1/attendances endpoint
  • Monitor access logs for suspicious requests to the vulnerable endpoint and implement IP blocking for malicious actors

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Devs CRM version. If version is 1.1.8 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=devs-crm --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.1.9 or later. Test API endpoint access by attempting unauthenticated GET request to /wp-json/devs-crm/v1/attendances - should return 403 or 404.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /wp-json/devs-crm/v1/attendances from unauthenticated users
  • Multiple rapid requests to the endpoint from single IPs

Network Indicators:

  • Unusual traffic patterns to WordPress REST API endpoints
  • Requests to devs-crm endpoints without authentication headers

SIEM Query:

source="web_logs" AND uri_path="/wp-json/devs-crm/v1/attendances" AND http_method="GET" AND NOT user_agent CONTAINS "WordPress"

🔗 References

📤 Share & Export