Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10476: CWE-862 Missing Authorization in emrevona WP Fastest Cache

0
Medium
VulnerabilityCVE-2025-10476cvecve-2025-10476cwe-862
Published: Thu Nov 27 2025 (11/27/2025, 10:57:36 UTC)
Source: CVE Database V5
Vendor/Project: emrevona
Product: WP Fastest Cache

Description

The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpfc_db_fix_callback() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to initiate several database fix actions. This only affects sites with premium activated.

AI-Powered Analysis

AILast updated: 12/04/2025, 11:55:09 UTC

Technical Analysis

The WP Fastest Cache plugin for WordPress, developed by emrevona, contains a vulnerability identified as CVE-2025-10476, classified under CWE-862 (Missing Authorization). This vulnerability exists in all versions up to and including 1.4.0 and affects sites with the premium version activated. The root cause is a missing capability check in the wpfc_db_fix_callback() function, which is responsible for initiating database fix actions. Because of this missing authorization, any authenticated user with Subscriber-level access or higher can trigger these database fix operations without proper permission. Although the vulnerability does not allow direct data disclosure or denial of service, it permits unauthorized modification of data, impacting data integrity. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the network attack vector, low attack complexity, and low privileges required, but no impact on confidentiality or availability. No user interaction is needed, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in September 2025 and published in November 2025. The lack of patches at the time of reporting suggests that users must rely on mitigation strategies until an official fix is released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress site data managed with the WP Fastest Cache premium plugin. Unauthorized database fix actions could lead to unintended or malicious alterations of cached data or database entries, potentially disrupting website functionality or causing data inconsistencies. Organizations relying on WordPress for content delivery, e-commerce, or customer engagement could experience degraded user experience or loss of trust if data integrity is compromised. While confidentiality and availability are not directly impacted, the integrity breach could be exploited as part of a broader attack chain. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with weak user access controls or where Subscriber-level accounts are easily obtained. This vulnerability is particularly relevant for European companies with large WordPress deployments, including media, retail, and public sector websites, where maintaining data integrity is critical.

Mitigation Recommendations

1. Immediately restrict Subscriber-level and other low-privilege user access to trusted individuals only, minimizing the risk of unauthorized exploitation. 2. Monitor WordPress logs and database activity for unusual or unauthorized calls to wpfc_db_fix_callback() or related database fix functions. 3. Disable or deactivate the WP Fastest Cache premium plugin if possible until a security patch is released. 4. Apply principle of least privilege by auditing and tightening user roles and capabilities within WordPress, ensuring that only necessary users have access to premium plugin features. 5. Stay informed about updates from the plugin vendor and apply security patches promptly once available. 6. Consider implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function. 7. Conduct regular backups of WordPress databases and site content to enable recovery in case of data integrity issues. 8. Educate site administrators and users about the risks associated with privilege escalation and unauthorized actions within WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-15T13:53:22.101Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692830538da2ca36c17c097d

Added to database: 11/27/2025, 11:04:51 AM

Last enriched: 12/4/2025, 11:55:09 AM

Last updated: 1/11/2026, 8:16:39 PM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats