Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10583: CWE-862 Missing Authorization in emrevona WP Fastest Cache

0
Low
VulnerabilityCVE-2025-10583cvecve-2025-10583cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 07:20:35 UTC)
Source: CVE Database V5
Vendor/Project: emrevona
Product: WP Fastest Cache

Description

The WP Fastest Cache plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.7.4 via the 'get_server_time_ajax_request' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 12/19/2025, 08:27:16 UTC

Technical Analysis

CVE-2025-10583 is a security vulnerability classified as CWE-862 (Missing Authorization) found in the WP Fastest Cache plugin for WordPress, versions up to and including 1.7.4. The vulnerability manifests through the 'get_server_time_ajax_request' AJAX action, which lacks proper authorization checks. This flaw enables authenticated users with Subscriber-level privileges or higher to perform Server-Side Request Forgery (SSRF) attacks. SSRF allows attackers to coerce the web server to send HTTP requests to arbitrary internal or external locations. This can be leveraged to probe internal network services, access sensitive information, or interact with internal APIs that are not exposed externally. The vulnerability requires the attacker to be authenticated but does not require user interaction beyond that. The CVSS 3.1 base score is 3.5, indicating low severity, primarily due to the need for authentication and the limited impact on confidentiality and integrity (no direct confidentiality loss, limited integrity impact, no availability impact). No public exploits or patches are currently available, but the vulnerability is publicly disclosed and assigned a CVE identifier. The scope is considered changed (S:C) because the attack can affect resources beyond the vulnerable component itself. The vulnerability is significant because WordPress is widely used, and caching plugins like WP Fastest Cache are common, making this a potential vector for internal network reconnaissance or lateral movement if exploited.

Potential Impact

For European organizations, this vulnerability poses a risk mainly in environments where WordPress sites use the WP Fastest Cache plugin and allow users with Subscriber-level access or higher. Attackers exploiting this SSRF vulnerability could perform internal network reconnaissance, potentially discovering internal services and APIs that are not otherwise exposed. This could lead to further attacks such as privilege escalation, data exfiltration, or manipulation of internal services. Although the direct impact on confidentiality and availability is low, the ability to interact with internal services can be a stepping stone for more severe attacks. Organizations with sensitive internal web services or APIs accessible only internally are at higher risk. The impact is heightened in sectors with strict data protection requirements, such as finance, healthcare, and government, where internal service integrity is critical. Additionally, the vulnerability could be used to bypass network segmentation or firewall rules, undermining network security controls. Since the vulnerability requires authentication, the risk is mitigated somewhat by strong user access management, but compromised or malicious low-privilege accounts could exploit it.

Mitigation Recommendations

1. Immediately restrict access to the WP Fastest Cache plugin's AJAX endpoints by implementing strict role-based access controls, ensuring only trusted users have Subscriber-level or higher privileges. 2. Monitor and log AJAX requests, especially those invoking 'get_server_time_ajax_request', to detect unusual or unauthorized internal requests. 3. Employ web application firewalls (WAFs) with rules to detect and block SSRF patterns originating from authenticated users. 4. Segment internal networks and restrict internal service accessibility to minimize the impact of SSRF attacks. 5. Regularly audit user accounts and remove or restrict unnecessary Subscriber-level or higher accounts to reduce the attack surface. 6. Stay alert for official patches or updates from the WP Fastest Cache plugin vendor and apply them promptly once available. 7. Consider temporarily disabling the plugin or the vulnerable AJAX action if immediate patching is not possible. 8. Educate site administrators about the risks of granting Subscriber-level access and enforce strong authentication mechanisms to prevent account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-16T20:02:55.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bc3e35f3fdafda42e6cd1

Added to database: 12/12/2025, 7:27:31 AM

Last enriched: 12/19/2025, 8:27:16 AM

Last updated: 2/6/2026, 7:53:30 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats