CVE-2025-67985

5.3 MEDIUM

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Barn2 Plugins Document Library Lite WordPress plugin. Attackers can bypass authorization controls by manipulating document IDs to access unauthorized files. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Barn2 Plugins Document Library Lite
Versions: All versions up to and including 1.1.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin enabled and using document library functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all documents stored through the plugin, including sensitive/confidential files that should be restricted to specific users.

🟠

Likely Case

Unauthorized access to documents that should be restricted, potentially exposing sensitive business information or personal data.

🟢

If Mitigated

Limited impact with proper access controls, but still represents a security control bypass that could be chained with other vulnerabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

IDOR vulnerabilities are typically easy to exploit once discovered, requiring only manipulation of object references in requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.8 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/document-library-lite/vulnerability/wordpress-document-library-lite-plugin-1-1-7-insecure-direct-object-references-idor-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Document Library Lite'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.1.8+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate document-library-lite

Restrict Access via .htaccess

linux

Add access controls to document directories

Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block IDOR patterns
  • Add additional authentication/authorization layer in front of document access endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Document Library Lite version

Check Version:

wp plugin get document-library-lite --field=version

Verify Fix Applied:

Verify plugin version is 1.1.8 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to document endpoints
  • Requests with sequential or manipulated document IDs
  • Access denied errors followed by successful access

Network Indicators:

  • HTTP requests with manipulated 'id', 'doc_id', or similar parameters
  • Unusual document download patterns from single IP

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/document-library-lite/" OR plugin="document-library-lite") AND (status=200 OR status=403) | stats count by client_ip, uri_query

🔗 References

📤 Share & Export