Unauthorized Data Manipulation in Crypto Plugin for WordPress
CVE-2025-11988

5.3MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
11 November 2025

What is CVE-2025-11988?

The Crypto plugin for WordPress exposes a critical flaw that allows unauthorized attackers to manipulate data. An unauthenticated AJAX action can be exploited to invoke the crypto_delete_json method, leveraging a publicly-accessible nonce check. This enables deletion of JSON files named *_pending.json located in the wp-content/uploads/yak/ directory. Consequently, this vulnerability may lead to data loss and disrupt plugin functionalities that depend on these files.

Affected Version(s)

Crypto Tool * <= 2.22

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonas Benjamin Friedli
.