CVE-2025-15527
📋 TL;DR
The WP Recipe Maker WordPress plugin up to version 10.2.2 contains an information exposure vulnerability where authenticated users with Contributor-level access or higher can retrieve sensitive post data they shouldn't have permission to access. This includes password-protected, private, and draft posts that should be restricted. The vulnerability exists in the api_get_post_summary function due to insufficient access controls.
💻 Affected Systems
- WP Recipe Maker WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could extract sensitive information from private, draft, or password-protected posts, potentially exposing confidential business information, unpublished content, or sensitive user data.
Likely Case
Malicious contributors or authors could read unpublished content, competitor research, or internal communications they shouldn't have access to, leading to information leakage.
If Mitigated
With proper access controls and patching, only authorized users can access posts according to their assigned permissions.
🎯 Exploit Status
Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is in an API endpoint that can be called directly.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.2.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Recipe Maker and click 'Update Now' if available. 4. Alternatively, download version 10.2.3+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable WP Recipe Maker Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate wp-recipe-maker
Restrict User Roles
allLimit users with Contributor role or higher to trusted individuals only
🧯 If You Can't Patch
- Disable the WP Recipe Maker plugin entirely until patching is possible
- Implement strict access controls and monitor user activity with Contributor+ roles
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for WP Recipe Maker version. If version is 10.2.2 or lower, you are vulnerable.
Check Version:
wp plugin list --name=wp-recipe-maker --field=version
Verify Fix Applied:
Verify WP Recipe Maker plugin version is 10.2.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual API calls to wp-json endpoints from Contributor-level users
- Multiple requests to /wp-json/wp-recipe-maker/v1/utilities/post-summary endpoint
Network Indicators:
- POST requests to /wp-json/wp-recipe-maker/v1/utilities/post-summary with post_id parameters
SIEM Query:
source="wordpress" AND uri_path="/wp-json/wp-recipe-maker/v1/utilities/post-summary" AND user_role IN ("contributor", "author", "editor", "administrator")
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-recipe-maker/trunk/includes/public/api/class-wprm-api-utilities.php#L172
- https://plugins.trac.wordpress.org/browser/wp-recipe-maker/trunk/includes/public/api/class-wprm-api-utilities.php#L48
- https://plugins.trac.wordpress.org/browser/wp-recipe-maker/trunk/includes/public/api/class-wprm-api-utilities.php#L86
- https://plugins.trac.wordpress.org/changeset/3415263/wp-recipe-maker/trunk/includes/public/api/class-wprm-api-utilities.php?contextall=1&old=3402554&old_path=%2Fwp-recipe-maker%2Ftrunk%2Fincludes%2Fpublic%2Fapi%2Fclass-wprm-api-utilities.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/96f77fdc-4e91-43c0-8bc6-7bb202945c7d?source=cve