Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10583: CWE-862 Missing Authorization in emrevona WP Fastest Cache

0
Low
VulnerabilityCVE-2025-10583cvecve-2025-10583cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 07:20:35 UTC)
Source: CVE Database V5
Vendor/Project: emrevona
Product: WP Fastest Cache

Description

The WP Fastest Cache plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.7.4 via the 'get_server_time_ajax_request' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 12/12/2025, 07:29:35 UTC

Technical Analysis

CVE-2025-10583 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Fastest Cache plugin for WordPress, versions up to and including 1.7.4. The flaw resides in the 'get_server_time_ajax_request' AJAX action, which lacks proper authorization checks, allowing authenticated users with Subscriber-level privileges or higher to perform Server-Side Request Forgery (SSRF). SSRF enables attackers to make HTTP requests from the vulnerable server to arbitrary locations, including internal network services that are otherwise inaccessible externally. This can lead to unauthorized querying or modification of internal resources, potentially exposing sensitive data or enabling further exploitation. The vulnerability requires authentication, limiting exposure to users with at least Subscriber access, and has a high attack complexity due to the need to craft specific requests and the limited privileges of the attacker. The CVSS 3.1 base score is 3.5, reflecting low severity, with no confidentiality impact but some integrity impact and no availability impact. No public exploits are known, and no patches have been linked yet, indicating the need for vigilance and proactive mitigation. The vulnerability is significant in environments where internal services are exposed or where Subscriber-level users are numerous or untrusted.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where WordPress sites use the WP Fastest Cache plugin and have multiple users with Subscriber or higher privileges. The SSRF can be leveraged to access internal services that are not normally exposed externally, potentially leading to unauthorized data access or modification within internal networks. This can compromise the integrity of internal systems and data, especially if internal APIs or management interfaces lack robust authentication. Although the CVSS score is low, the chained exploitation potential in complex environments could elevate the threat. Organizations with sensitive internal services accessible from the WordPress server or those using WordPress as a gateway to other internal resources are at higher risk. The impact is more pronounced in sectors with high regulatory requirements for data integrity and confidentiality, such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

1. Immediately restrict WordPress user roles by minimizing the number of users with Subscriber or higher privileges, especially on sites using WP Fastest Cache. 2. Monitor and audit AJAX requests, particularly those invoking 'get_server_time_ajax_request', to detect unusual or unauthorized activity. 3. Implement network segmentation to ensure that the WordPress server has limited access to internal services, reducing the SSRF attack surface. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns originating from authenticated users. 5. Regularly update the WP Fastest Cache plugin and WordPress core once patches addressing this vulnerability are released. 6. Consider disabling or restricting AJAX actions that are not essential, or implement additional authorization checks at the application level. 7. Conduct internal penetration testing focusing on SSRF and privilege escalation vectors to identify and remediate similar weaknesses. 8. Educate administrators and users about the risks of excessive permissions and the importance of least privilege principles.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-16T20:02:55.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bc3e35f3fdafda42e6cd1

Added to database: 12/12/2025, 7:27:31 AM

Last enriched: 12/12/2025, 7:29:35 AM

Last updated: 12/15/2025, 2:07:53 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats