CVE-2025-57971

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in SALESmanago & Leadoo WordPress plugins that allows attackers to bypass access controls. It affects all versions up to 3.8.1, potentially enabling unauthorized access to functionality or data. WordPress sites using these plugins are vulnerable.

💻 Affected Systems

Products:
  • SALESmanago WordPress Plugin
  • Leadoo WordPress Plugin
Versions: All versions up to and including 3.8.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with these plugins activated. The vulnerability exists in the access control mechanisms.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access administrative functions, modify plugin settings, or access sensitive customer data stored by the plugins.

🟠

Likely Case

Unauthorized users could modify plugin configurations, potentially disrupting marketing automation or lead capture functionality.

🟢

If Mitigated

With proper access controls, only authenticated users with appropriate permissions can access plugin functionality.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and accessible via web interfaces.
🏢 Internal Only: LOW - This primarily affects internet-facing WordPress installations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of WordPress plugin structure and access control bypass techniques. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.8.1

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/salesmanago/vulnerability/wordpress-salesmanago-plugin-3-8-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SALESmanago or Leadoo plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the vulnerable plugins until patching is possible

wp plugin deactivate salesmanago
wp plugin deactivate leadoo

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to WordPress admin interface
  • Add web application firewall rules to detect and block unauthorized access attempts to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for SALESmanago or Leadoo version 3.8.1 or earlier

Check Version:

wp plugin get salesmanago --field=version && wp plugin get leadoo --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.8.1 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to plugin-specific admin endpoints by non-admin users
  • Failed authorization attempts to plugin functionality

Network Indicators:

  • HTTP requests to plugin-specific admin endpoints from unauthorized IPs
  • Unusual POST requests to plugin AJAX handlers

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND uri_query CONTAINS "action=salesmanago" OR uri_query CONTAINS "action=leadoo") AND user_role!="administrator"

🔗 References

📤 Share & Export