CVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the process_status_unlink() function in all versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to delete the back-up progress files and cause a back-up to fail while it is in progress.
AI Analysis
Technical Summary
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin contains a vulnerability identified as CVE-2025-10304, classified under CWE-862 (Missing Authorization). The flaw exists in the process_status_unlink() function, which lacks proper capability checks, allowing unauthenticated attackers to invoke this function and delete backup progress files during an active backup operation. This deletion disrupts the backup process, causing it to fail and potentially leaving systems without recent backups. The vulnerability affects all versions up to and including 2.3.8. The CVSS v3.1 base score is 5.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to integrity, as confidentiality and availability are not directly compromised. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is significant because backups are critical for disaster recovery and data protection, and disruption can delay recovery efforts or cause data loss if backups are not completed successfully. The plugin is used in WordPress environments, which are widely deployed across many organizations, increasing the potential attack surface.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of backup operations. Organizations relying on Everest Backup for critical data protection may experience failed backups, leading to gaps in recovery points and increased risk of data loss in the event of ransomware or other destructive incidents. Although the vulnerability does not allow data theft or system takeover, the inability to complete backups can severely impact business continuity and compliance with data protection regulations such as GDPR, which require reliable data retention and recovery mechanisms. Organizations with automated backup schedules may not immediately detect backup failures caused by this exploit, increasing exposure time. The lack of authentication requirement means attackers can exploit this remotely without credentials, increasing risk especially for publicly accessible WordPress sites. The impact is more pronounced for sectors with stringent data protection needs, such as finance, healthcare, and government entities in Europe.
Mitigation Recommendations
Immediate mitigation involves restricting access to the plugin’s backup-related endpoints, particularly the process_status_unlink() function, through web application firewalls (WAFs) or server-level access controls to prevent unauthenticated requests. Organizations should monitor backup logs for unexpected failures or deletions of backup progress files. Since no official patch is currently available, administrators should consider disabling the Everest Backup plugin temporarily if backups are critical and cannot be monitored effectively. Implementing network segmentation to isolate WordPress servers and limiting exposure to the internet can reduce attack surface. Once a patch is released, prompt application is essential. Additionally, organizations should maintain alternative backup solutions and verify backup integrity regularly to ensure recovery readiness. Security teams should also audit user permissions and plugin configurations to enforce least privilege principles.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
Description
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the process_status_unlink() function in all versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to delete the back-up progress files and cause a back-up to fail while it is in progress.
AI-Powered Analysis
Technical Analysis
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin contains a vulnerability identified as CVE-2025-10304, classified under CWE-862 (Missing Authorization). The flaw exists in the process_status_unlink() function, which lacks proper capability checks, allowing unauthenticated attackers to invoke this function and delete backup progress files during an active backup operation. This deletion disrupts the backup process, causing it to fail and potentially leaving systems without recent backups. The vulnerability affects all versions up to and including 2.3.8. The CVSS v3.1 base score is 5.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to integrity, as confidentiality and availability are not directly compromised. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is significant because backups are critical for disaster recovery and data protection, and disruption can delay recovery efforts or cause data loss if backups are not completed successfully. The plugin is used in WordPress environments, which are widely deployed across many organizations, increasing the potential attack surface.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of backup operations. Organizations relying on Everest Backup for critical data protection may experience failed backups, leading to gaps in recovery points and increased risk of data loss in the event of ransomware or other destructive incidents. Although the vulnerability does not allow data theft or system takeover, the inability to complete backups can severely impact business continuity and compliance with data protection regulations such as GDPR, which require reliable data retention and recovery mechanisms. Organizations with automated backup schedules may not immediately detect backup failures caused by this exploit, increasing exposure time. The lack of authentication requirement means attackers can exploit this remotely without credentials, increasing risk especially for publicly accessible WordPress sites. The impact is more pronounced for sectors with stringent data protection needs, such as finance, healthcare, and government entities in Europe.
Mitigation Recommendations
Immediate mitigation involves restricting access to the plugin’s backup-related endpoints, particularly the process_status_unlink() function, through web application firewalls (WAFs) or server-level access controls to prevent unauthenticated requests. Organizations should monitor backup logs for unexpected failures or deletions of backup progress files. Since no official patch is currently available, administrators should consider disabling the Everest Backup plugin temporarily if backups are critical and cannot be monitored effectively. Implementing network segmentation to isolate WordPress servers and limiting exposure to the internet can reduce attack surface. Once a patch is released, prompt application is essential. Additionally, organizations should maintain alternative backup solutions and verify backup integrity regularly to ensure recovery readiness. Security teams should also audit user permissions and plugin configurations to enforce least privilege principles.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-11T21:54:46.884Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692fb1c7619fec35b4585800
Added to database: 12/3/2025, 3:43:03 AM
Last enriched: 12/10/2025, 4:44:25 AM
Last updated: 1/18/2026, 12:15:08 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1105: SQL Injection in EasyCMS
MediumCVE-2026-1066: Command Injection in kalcaddle kodbox
MediumCVE-2026-1064: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1063: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1062: Server-Side Request Forgery in xiweicheng TMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.