CVE-2025-64234

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Evergreen Content Poster WordPress plugin that allows attackers to exploit incorrectly configured access control security levels. It affects all versions up to and including 1.4.5, potentially allowing unauthorized users to perform actions they shouldn't have permission for.

💻 Affected Systems

Products:
  • Evergreen Content Poster WordPress Plugin
Versions: All versions up to and including 1.4.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Evergreen Content Poster plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify plugin settings, post content, or access administrative functions depending on the specific broken access control implementation.

🟠

Likely Case

Low-privileged users could perform actions intended only for administrators or editors, potentially modifying content or settings.

🟢

If Mitigated

With proper WordPress user role management and security plugins, impact would be limited to attempted unauthorized access that gets blocked.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some WordPress user access, though potentially low-privileged. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.4.6 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/evergreen-content-poster/vulnerability/wordpress-evergreen-content-poster-plugin-1-4-5-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Evergreen Content Poster and click 'Update Now' if available. 4. If no update appears, manually download version 1.4.6+ from WordPress.org and replace the plugin files via FTP/SFTP.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily deactivate the Evergreen Content Poster plugin until patched

wp plugin deactivate evergreen-content-poster

🧯 If You Can't Patch

  • Implement strict WordPress user role management and review all user permissions
  • Deploy a WordPress security plugin with access control monitoring and hardening features

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Evergreen Content Poster version 1.4.5 or earlier

Check Version:

wp plugin get evergreen-content-poster --field=version

Verify Fix Applied:

Verify plugin version is 1.4.6 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • WordPress audit logs showing unauthorized plugin function calls
  • User role escalation attempts in security plugin logs

Network Indicators:

  • Unusual POST requests to plugin-specific admin-ajax.php endpoints

SIEM Query:

source="wordpress" AND (plugin="evergreen-content-poster" AND (action="unauthorized" OR user_role_change="suspicious"))

🔗 References

📤 Share & Export