Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13749: CWE-352 Cross-Site Request Forgery (CSRF) in creativemotion Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

0
Medium
VulnerabilityCVE-2025-13749cvecve-2025-13749cwe-352
Published: Fri Jan 09 2026 (01/09/2026, 05:25:20 UTC)
Source: CVE Database V5
Vendor/Project: creativemotion
Product: Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

Description

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.0. This is due to missing nonce validation on the "wbcr_upm_change_flag" function. This makes it possible for unauthenticated attackers to disable plugin/theme update notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 01/09/2026, 05:55:56 UTC

Technical Analysis

CVE-2025-13749 is a Cross-Site Request Forgery vulnerability identified in the Clearfy Cache – WordPress optimization plugin, which provides features such as minifying HTML, CSS, and JavaScript, and deferring script loading to improve website performance. The vulnerability affects all versions up to and including 2.4.0 due to the absence of nonce validation in the wbcr_upm_change_flag function. Nonce validation is a security measure that ensures requests are legitimate and initiated by authenticated users. Without this protection, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), disables plugin or theme update notifications. This action does not require the attacker to be authenticated themselves but relies on social engineering to induce the administrator to perform the action. The CVSS v3.1 score is 4.3 (medium severity), reflecting the low complexity of attack (no privileges required, network vector), but requiring user interaction and only impacting integrity (disabling update notifications). The vulnerability does not directly lead to data disclosure or denial of service but weakens the site's security posture by preventing timely updates, which could be leveraged by other threats. No patches or exploits are currently reported, but the risk lies in the potential for attackers to maintain persistence or escalate attacks by blocking updates. This vulnerability is categorized under CWE-352 (Cross-Site Request Forgery).

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of WordPress site maintenance processes. By disabling update notifications, attackers can prevent administrators from being alerted to critical security patches, increasing the risk of exploitation from other vulnerabilities. This is particularly concerning for organizations relying on WordPress for e-commerce, government portals, or other critical services, where delayed updates can lead to data breaches or service disruptions. Although the vulnerability itself does not directly compromise data confidentiality or availability, it creates an attack vector for more severe exploits. The impact is amplified in environments where administrators may be less aware of phishing or social engineering tactics, or where update processes are not automated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the widespread use of WordPress and this plugin in Europe.

Mitigation Recommendations

1. Monitor for and apply plugin updates from the vendor as soon as they become available to address this vulnerability. 2. Until patches are released, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the wbcr_upm_change_flag function or related endpoints. 3. Educate WordPress administrators about the risks of clicking unsolicited links, especially those that could trigger administrative actions. 4. Consider disabling or limiting the use of the Clearfy Cache plugin if update notification integrity is critical and no patch is available. 5. Employ multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. 6. Regularly audit WordPress plugin and theme update statuses manually to detect any unauthorized disabling of notifications. 7. Use security plugins that provide additional CSRF protections or monitoring capabilities. 8. Encourage automation of updates where feasible to reduce reliance on notifications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T16:42:23.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69609510ecefc3cd7c07ebe9

Added to database: 1/9/2026, 5:41:36 AM

Last enriched: 1/9/2026, 5:55:56 AM

Last updated: 1/9/2026, 9:12:03 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats