CVE-2025-64234
📋 TL;DR
This CVE describes a missing authorization vulnerability in the Evergreen Content Poster WordPress plugin that allows attackers to exploit incorrectly configured access control security levels. It affects all versions up to and including 1.4.5, potentially allowing unauthorized users to perform actions they shouldn't have permission for.
💻 Affected Systems
- Evergreen Content Poster WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could modify plugin settings, post content, or access administrative functions depending on the specific broken access control implementation.
Likely Case
Low-privileged users could perform actions intended only for administrators or editors, potentially modifying content or settings.
If Mitigated
With proper WordPress user role management and security plugins, impact would be limited to attempted unauthorized access that gets blocked.
🎯 Exploit Status
Exploitation requires some WordPress user access, though potentially low-privileged. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.4.6 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Evergreen Content Poster and click 'Update Now' if available. 4. If no update appears, manually download version 1.4.6+ from WordPress.org and replace the plugin files via FTP/SFTP.
🔧 Temporary Workarounds
Disable Plugin
WordPressTemporarily deactivate the Evergreen Content Poster plugin until patched
wp plugin deactivate evergreen-content-poster
🧯 If You Can't Patch
- Implement strict WordPress user role management and review all user permissions
- Deploy a WordPress security plugin with access control monitoring and hardening features
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for Evergreen Content Poster version 1.4.5 or earlier
Check Version:
wp plugin get evergreen-content-poster --field=version
Verify Fix Applied:
Verify plugin version is 1.4.6 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- WordPress audit logs showing unauthorized plugin function calls
- User role escalation attempts in security plugin logs
Network Indicators:
- Unusual POST requests to plugin-specific admin-ajax.php endpoints
SIEM Query:
source="wordpress" AND (plugin="evergreen-content-poster" AND (action="unauthorized" OR user_role_change="suspicious"))