Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11171: CWE-306 Missing Authentication for Critical Function in ays-pro Chartify – WordPress Chart Plugin

0
Medium
VulnerabilityCVE-2025-11171cvecve-2025-11171cwe-306
Published: Wed Oct 08 2025 (10/08/2025, 05:24:49 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Chartify – WordPress Chart Plugin

Description

The Chartify – WordPress Chart Plugin for WordPress is vulnerable to Missing Authentication for Critical Function in all versions up to, and including, 3.5.9. This is due to the plugin registering an unauthenticated AJAX action that dispatches to admin-class methods based on a request parameter, without any nonce or capability checks. This makes it possible for unauthenticated attackers to execute administrative functions via the wp-admin/admin-ajax.php endpoint granted they can identify callable method names.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:49:38 UTC

Technical Analysis

CVE-2025-11171 identifies a Missing Authentication vulnerability (CWE-306) in the Chartify – WordPress Chart Plugin, affecting all versions up to and including 3.5.9. The root cause is the plugin registering an unauthenticated AJAX action accessible via the wp-admin/admin-ajax.php endpoint. This AJAX action dispatches requests to administrative class methods based on a request parameter without performing any nonce verification or capability checks, which are standard WordPress security mechanisms to ensure that only authorized users can invoke sensitive functions. As a result, an unauthenticated attacker can craft requests that invoke administrative functions remotely, potentially modifying site data or configurations. The vulnerability does not impact confidentiality or availability directly but compromises integrity by allowing unauthorized administrative operations. Exploitation requires no authentication or user interaction, increasing the risk of automated attacks. The CVSS 3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No patches or exploit code are currently publicly available, but the vulnerability is publicly disclosed and should be addressed promptly. This vulnerability highlights the importance of implementing proper authentication and authorization checks on all AJAX endpoints, especially those exposing administrative functionality in WordPress plugins.

Potential Impact

The primary impact of CVE-2025-11171 is unauthorized execution of administrative functions within affected WordPress sites using the Chartify plugin. This can lead to unauthorized modifications of site data, configurations, or plugin behavior, potentially undermining the integrity of the website. Although confidentiality and availability are not directly affected, integrity violations can facilitate further attacks, such as defacement, data manipulation, or privilege escalation. Since exploitation requires no authentication or user interaction, attackers can automate attacks at scale, increasing the risk for websites with this plugin installed. Organizations relying on Chartify for data visualization on WordPress sites may face reputational damage, loss of user trust, and operational disruptions if attackers exploit this vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. The vulnerability is particularly impactful for organizations with public-facing WordPress sites that utilize this plugin without additional access controls or monitoring.

Mitigation Recommendations

To mitigate CVE-2025-11171, organizations should immediately update the Chartify plugin to a patched version once available. In the absence of an official patch, administrators should disable or restrict access to the wp-admin/admin-ajax.php endpoint for unauthenticated users, for example by implementing web application firewall (WAF) rules that block suspicious AJAX requests targeting this plugin. Reviewing and hardening plugin code to add nonce verification and capability checks on all AJAX actions is critical. Site owners should audit their WordPress installations for unauthorized changes and monitor logs for unusual AJAX activity. Employing least privilege principles for WordPress users and limiting plugin usage to trusted environments can reduce exposure. Additionally, isolating administrative AJAX endpoints behind authentication or IP whitelisting can provide temporary protection. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, security teams should track updates from the plugin vendor and WordPress security advisories for timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-29T17:24:27.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e5f884c921af165e2d8721

Added to database: 10/8/2025, 5:37:08 AM

Last enriched: 2/27/2026, 6:49:38 PM

Last updated: 3/21/2026, 6:22:43 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses