Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10313: CWE-862 Missing Authorization in jankimoradiya Find And Replace content for WordPress

0
High
VulnerabilityCVE-2025-10313cvecve-2025-10313cwe-862
Published: Wed Oct 15 2025 (10/15/2025, 08:26:02 UTC)
Source: CVE Database V5
Vendor/Project: jankimoradiya
Product: Find And Replace content for WordPress

Description

The Find And Replace content for WordPress plugin for WordPress is vulnerable to unauthorized Stored Cross-Site Scripting and Arbitrary Content Replacement due to a missing capability check on the far_admin_ajax_fun() function in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts into pages that can make privilege escalation and malicious redirects possible.

AI-Powered Analysis

AILast updated: 10/15/2025, 08:50:33 UTC

Technical Analysis

CVE-2025-10313 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Find And Replace content for WordPress plugin developed by jankimoradiya. The flaw exists in the far_admin_ajax_fun() function, which lacks proper capability checks, allowing unauthenticated users to invoke this function. This absence of authorization enables attackers to inject arbitrary web scripts into WordPress pages via stored cross-site scripting (XSS) and arbitrary content replacement. Stored XSS can lead to session hijacking, privilege escalation, or redirecting users to malicious sites. The vulnerability affects all versions up to and including 1.1 of the plugin. The CVSS 3.1 base score is 7.2, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with low confidentiality and integrity impact (C:L/I:L) and no availability impact (A:N). No patches or fixes are currently published, and no known exploits have been reported in the wild. The vulnerability's exploitation could compromise the confidentiality and integrity of affected WordPress sites, enabling attackers to manipulate site content and potentially escalate privileges or conduct phishing attacks via malicious redirects. The vulnerability is particularly dangerous because it does not require authentication or user interaction, making automated exploitation feasible. The affected plugin is used to perform content find-and-replace operations within WordPress, a widely adopted CMS, increasing the potential attack surface.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their web content and user data. Exploitation could lead to unauthorized content manipulation, defacement, or injection of malicious scripts that compromise user sessions or redirect visitors to malicious sites. This could result in data breaches, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. Organizations relying on WordPress for e-commerce, media, or corporate websites could face operational disruptions and reputational damage. The lack of authentication requirement and low attack complexity increase the likelihood of exploitation, especially for publicly accessible websites. Additionally, the scope change in the vulnerability means that the impact could extend beyond the plugin itself to other components or user privileges within the WordPress environment. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains high due to the ease of exploitation and potential impact.

Mitigation Recommendations

1. Immediately audit all WordPress installations to identify the presence of the Find And Replace content plugin by jankimoradiya, especially versions up to 1.1. 2. Disable or remove the vulnerable plugin until an official patch or update is released by the vendor. 3. Restrict access to the WordPress admin AJAX endpoint (/wp-admin/admin-ajax.php) via web application firewalls (WAF) or IP whitelisting to limit exposure to unauthenticated requests. 4. Implement strict Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks by restricting script sources. 5. Monitor web server logs and WordPress activity logs for unusual or unauthorized AJAX requests targeting the vulnerable function. 6. Educate site administrators about the risks of installing plugins from unverified sources and the importance of timely updates. 7. Once a patch is available, apply it promptly and verify the fix through testing. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and block malicious script injections in real time. 9. Regularly back up website content and configurations to enable quick recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T23:27:17.039Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7dc4f69c9730e569c5

Added to database: 10/15/2025, 8:34:05 AM

Last enriched: 10/15/2025, 8:50:33 AM

Last updated: 10/16/2025, 1:13:10 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats