CVE-2025-14464

5.3 MEDIUM

📋 TL;DR

The PDF Resume Parser WordPress plugin exposes SMTP credentials to unauthenticated users through an insecure AJAX endpoint. This allows attackers to steal email account credentials, potentially leading to email compromise and credential reuse attacks. All WordPress sites using this plugin version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • PDF Resume Parser WordPress Plugin
Versions: All versions up to and including 1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration. Requires WordPress installation with plugin activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of SMTP email accounts, use credentials to access other systems via credential stuffing, send phishing emails from legitimate domains, and potentially pivot to internal networks.

🟠

Likely Case

Attackers steal SMTP credentials, compromise email accounts, monitor sensitive communications, and use credentials for credential stuffing attacks against other services.

🟢

If Mitigated

Limited impact if SMTP credentials are unique to this service, email accounts have additional security controls, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to AJAX endpoint exposes credentials. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/pdf-resume-parser/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find PDF Resume Parser plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate and remove vulnerable plugin from WordPress installation

wp plugin deactivate pdf-resume-parser
wp plugin delete pdf-resume-parser

Block AJAX Endpoint

linux

Use web application firewall or .htaccess to block access to vulnerable endpoint

# Add to .htaccess: RewriteRule ^wp-admin/admin-ajax\.php.*pdf-resume-parser.* - [F,L]

🧯 If You Can't Patch

  • Immediately deactivate and remove the PDF Resume Parser plugin from all WordPress installations
  • Change all SMTP credentials exposed by this vulnerability and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check if plugin is installed and version is 1.0 or earlier via WordPress admin panel or by examining wp-content/plugins/pdf-resume-parser/pdf-resume-parser.php file version header

Check Version:

wp plugin get pdf-resume-parser --field=version

Verify Fix Applied:

Confirm plugin version is 1.1 or later, or verify plugin is completely removed from wp-content/plugins directory

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=pdf_resume_parser_smtp_test
  • Multiple failed SMTP authentication attempts from new IP addresses
  • Unusual outbound email traffic patterns

Network Indicators:

  • HTTP requests to WordPress AJAX endpoints from unexpected sources
  • SMTP connections using exposed credentials from unauthorized IPs

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND params.action="pdf_resume_parser_smtp_test"

🔗 References

📤 Share & Export