Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10849: CWE-862 Missing Authorization in RiceTheme Felan Framework

0
Medium
VulnerabilityCVE-2025-10849cvecve-2025-10849cwe-862
Published: Thu Oct 16 2025 (10/16/2025, 06:47:30 UTC)
Source: CVE Database V5
Vendor/Project: RiceTheme
Product: Felan Framework

Description

The Felan Framework plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_plugin_actions' function called via an AJAX action in versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to activate or deactivate arbitrary plugins.

AI-Powered Analysis

AILast updated: 10/16/2025, 07:17:29 UTC

Technical Analysis

CVE-2025-10849 identifies a missing authorization vulnerability (CWE-862) in the RiceTheme Felan Framework WordPress plugin, versions up to and including 1.1.4. The vulnerability exists in the 'process_plugin_actions' function, which is invoked via an AJAX action. This function fails to perform a capability check to verify whether the requester has the necessary permissions to activate or deactivate plugins. Consequently, unauthenticated attackers can send crafted AJAX requests to arbitrarily enable or disable plugins on the affected WordPress site. This unauthorized modification can disrupt site functionality, potentially disable security plugins, or enable malicious plugins, thereby undermining the integrity of the site. The vulnerability does not directly expose confidential data or cause denial of service but can be a stepping stone for further attacks. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The Felan Framework plugin is used in WordPress environments, which are widely deployed across Europe, especially in small to medium enterprises and public sector websites.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of their WordPress sites. Attackers can manipulate plugin states without authentication, potentially disabling security or monitoring plugins or activating malicious ones, which could lead to further compromise, data breaches, or defacement. Public-facing websites, government portals, and e-commerce platforms using the Felan Framework plugin are particularly vulnerable. The impact is heightened in sectors relying heavily on WordPress for content management and customer interaction. Although no direct confidentiality or availability impact is noted, the integrity compromise can cascade into more severe security incidents. The absence of known exploits currently limits immediate widespread damage, but the ease of exploitation and lack of authentication requirements make this a significant threat if weaponized. Organizations may face reputational damage, regulatory scrutiny, and operational disruption if exploited.

Mitigation Recommendations

Immediate mitigation involves monitoring for updates from RiceTheme and applying patches as soon as they are released. Until a patch is available, organizations should implement web application firewall (WAF) rules to detect and block unauthorized AJAX requests targeting the 'process_plugin_actions' endpoint. Restricting access to the WordPress admin-ajax.php endpoint via IP whitelisting or authentication enforcement can reduce exposure. Additionally, auditing active plugins regularly to detect unauthorized changes and employing intrusion detection systems to monitor anomalous plugin activation/deactivation events are recommended. Organizations should also enforce the principle of least privilege for WordPress users and consider disabling or removing the Felan Framework plugin if it is not essential. Regular backups and incident response plans should be updated to address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-22T06:26:51.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f0983c20d29eed058254ae

Added to database: 10/16/2025, 7:01:16 AM

Last enriched: 10/16/2025, 7:17:29 AM

Last updated: 10/16/2025, 8:10:57 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats