Published On: Dec 14, 2025 20:53
Advisory No: TZCERT-SA-25-0127
Source: Wordfence
Software Affected: lazytasks, gf-multi-uploader, wp-cardealer, eltdf-membership
WordPress is vulnerable to critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to gain administrative access to the affected system.
WordPress plugins lazytasks, gf-multi-uploader, wp-cardealer, and eltdf-membership are affected by the vulnerabilities tracked as CVE-2025-12963, CVE-2025-14344, CVE-2025-13764, and CVE-2025-13613 with CVSS scores of 9.8 each. The plugins are vulnerable due to improper validation of user's identity via the 'wp-json/lazytasks/api/v1/user/role/edit/' REST API endpoint prior to updating their details like email address, insufficient file path validation in the 'plupload_ajax_delete_file' function, 'WP_CarDealer_User::process_register' function not restricting what user roles a user can register with, and improperly logging in a user with the data that was previously verified through the 'eltdf_membership_check_facebook_user' and the 'eltdf_membership_login_user_from_social_network' function. Successful exploitation of this vulnerability allows unauthenticated attackers to change arbitrary user's email addresses, delete arbitrary files on the server, gain administrator access to the site, and access to the administrative user's email.
Successful exploitation of these vulnerabilities may allow an attacker to gain access to the affected system.
WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.