Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13749: CWE-352 Cross-Site Request Forgery (CSRF) in creativemotion Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

0
Medium
VulnerabilityCVE-2025-13749cvecve-2025-13749cwe-352
Published: Fri Jan 09 2026 (01/09/2026, 05:25:20 UTC)
Source: CVE Database V5
Vendor/Project: creativemotion
Product: Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

Description

CVE-2025-13749 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Clearfy Cache WordPress optimization plugin (up to version 2. 4. 0). The vulnerability arises from missing nonce validation in the "wbcr_upm_change_flag" function, allowing unauthenticated attackers to trick site administrators into disabling plugin or theme update notifications via a forged request. Exploitation requires user interaction, specifically an administrator clicking a malicious link. While the vulnerability does not directly compromise confidentiality or availability, it impacts the integrity of update notifications, potentially leaving sites exposed to unpatched vulnerabilities. No known exploits are currently in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to maintain update integrity and reduce attack surface. Countries with high WordPress adoption and significant use of this plugin are most at risk.

AI-Powered Analysis

AILast updated: 01/16/2026, 10:03:38 UTC

Technical Analysis

CVE-2025-13749 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Clearfy Cache – WordPress optimization plugin, which provides features such as minification of HTML, CSS, and JavaScript, as well as deferring script loading to improve site performance. The vulnerability affects all versions up to and including 2.4.0. The root cause is the absence of nonce validation in the "wbcr_upm_change_flag" function, which is responsible for toggling flags related to plugin or theme update notifications. Without nonce checks, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a link), disables update notifications. This action does not require prior authentication by the attacker but does require user interaction from an admin. The CVSS 3.1 base score is 4.3 (medium), reflecting the fact that the attack vector is network-based, requires no privileges, but does require user interaction and only impacts integrity (disabling update notifications). The vulnerability does not affect confidentiality or availability directly. Disabling update notifications can indirectly increase risk by preventing administrators from being alerted to critical updates, potentially allowing other vulnerabilities to persist unpatched. No public exploits have been reported, and no patches are currently linked, so mitigation may rely on plugin updates or configuration changes. The vulnerability is categorized under CWE-352, which covers CSRF issues where state-changing requests lack proper anti-CSRF tokens.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential degradation of security hygiene rather than immediate compromise. By disabling plugin and theme update notifications, attackers can increase the window of exposure to other vulnerabilities that would otherwise be patched promptly. This can lead to a higher risk of subsequent attacks such as remote code execution, privilege escalation, or data breaches if critical updates are missed. Organizations relying on WordPress for public-facing websites, intranets, or e-commerce platforms may face reputational damage, compliance issues (especially under GDPR if data is compromised later), and operational disruptions. The indirect nature of the impact means that while no immediate data loss or service disruption occurs, the vulnerability facilitates a stealthy weakening of defenses. European entities with limited security monitoring or delayed patch management processes are particularly vulnerable to the cascading effects of this issue.

Mitigation Recommendations

1. Immediate mitigation involves updating the Clearfy Cache plugin to a version that includes nonce validation for the "wbcr_upm_change_flag" function once available. Monitor the vendor's announcements for patches. 2. Until a patch is released, restrict administrative access to trusted networks and users to reduce the likelihood of an attacker tricking an admin into clicking malicious links. 3. Implement Content Security Policy (CSP) and SameSite cookie attributes to help mitigate CSRF risks. 4. Educate administrators about the risks of clicking unknown or unsolicited links, especially when logged into WordPress admin panels. 5. Use security plugins or Web Application Firewalls (WAFs) that can detect and block suspicious CSRF attempts targeting WordPress admin functions. 6. Regularly audit plugin usage and remove unnecessary or outdated plugins to reduce attack surface. 7. Monitor logs for unusual changes in plugin/theme update notification settings. 8. Employ multi-factor authentication (MFA) for WordPress admin accounts to add an additional layer of security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T16:42:23.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69609510ecefc3cd7c07ebe9

Added to database: 1/9/2026, 5:41:36 AM

Last enriched: 1/16/2026, 10:03:38 AM

Last updated: 2/7/2026, 12:30:50 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats