Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin

0
Medium
VulnerabilityCVE-2025-10304cvecve-2025-10304cwe-862
Published: Wed Dec 03 2025 (12/03/2025, 03:27:15 UTC)
Source: CVE Database V5
Vendor/Project: everestthemes
Product: Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin

Description

The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the process_status_unlink() function in all versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to delete the back-up progress files and cause a back-up to fail while it is in progress.

AI-Powered Analysis

AILast updated: 12/03/2025, 03:58:21 UTC

Technical Analysis

The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin suffers from a missing authorization check vulnerability (CWE-862) in its process_status_unlink() function. This function handles the deletion of backup progress files during ongoing backup operations. Due to the absence of capability checks, unauthenticated attackers can invoke this function remotely to delete these progress files, causing the backup process to fail prematurely. The vulnerability affects all plugin versions up to 2.3.8. Exploitation requires no privileges or user interaction and can be performed over the network. While the vulnerability does not expose backup data or allow direct system compromise, it undermines the integrity of backup operations by disrupting their completion. This can lead to incomplete or missing backups, increasing the risk of data loss in case of system failure or ransomware attacks. No patches or official fixes are currently linked, and no active exploitation has been reported. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of exploitation but limited impact on confidentiality and availability. Organizations relying on this plugin for critical backup and migration tasks should monitor for updates and consider interim protective measures.

Potential Impact

For European organizations, the primary impact is operational disruption of backup processes, which can compromise data recovery capabilities. Incomplete or failed backups increase the risk of data loss during incidents such as ransomware attacks, hardware failures, or accidental deletions. This can affect business continuity and compliance with data protection regulations like GDPR, which require reliable data backup and recovery mechanisms. Although the vulnerability does not directly expose sensitive data or allow system takeover, the inability to complete backups reliably can have serious downstream effects on data integrity and availability. Organizations with large WordPress deployments using Everest Backup for cloud backup, migration, or cloning are particularly at risk. The disruption could also affect managed service providers and hosting companies offering WordPress services across Europe, potentially impacting multiple clients. The medium severity rating suggests that while the threat is not critical, it warrants timely remediation to prevent operational risks.

Mitigation Recommendations

1. Monitor the Everestthemes plugin repository and official communication channels for patches addressing CVE-2025-10304 and apply updates promptly once available. 2. Until a patch is released, restrict access to the WordPress REST API or any endpoints invoking process_status_unlink() by implementing web application firewall (WAF) rules or IP whitelisting to block unauthenticated requests targeting this function. 3. Harden WordPress installations by limiting plugin usage to trusted sources and regularly auditing installed plugins for vulnerabilities. 4. Implement monitoring and alerting on backup process failures to detect potential exploitation attempts early. 5. Consider isolating backup operations in environments with strict access controls to reduce exposure. 6. Educate administrators on the importance of verifying plugin permissions and capability checks during plugin deployment and updates. 7. Employ intrusion detection systems to identify anomalous requests that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T21:54:46.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692fb1c7619fec35b4585800

Added to database: 12/3/2025, 3:43:03 AM

Last enriched: 12/3/2025, 3:58:21 AM

Last updated: 12/3/2025, 9:13:18 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats