Impact
The WP Crowdfunding plugin for WordPress has a missing capability check on the download_data action in all versions up to 2.1.14. This omission allows authenticated attackers with subscriber-level access or higher to download all of a site's post content when WooCommerce is installed. The result is an unauthorized leakage of confidential post data and a breach of data confidentiality.
Affected Systems
The affected vendor is Themeum, providing the WP Crowdfunding plugin. Versions up to and including 2.1.14 are vulnerable. The issue only manifests on WordPress sites that also have WooCommerce installed. All other WordPress installations without WooCommerce are not exposed to this specific download capability.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity. The EPSS score is below 1 %, suggesting a low likelihood of exploitation in the wild, and the vulnerability is not currently listed in CISA’s KEV catalog. Attackers must be authenticated; a subscriber or higher role is sufficient. Once authenticated, the attacker can simply request the download_data endpoint to pull every post. Because the flaw resides in a capability check, removal of the capability or updating the plugin mitigates the risk.
OpenCVE Enrichment
EUVD