Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14168: CWE-352 Cross-Site Request Forgery (CSRF) in wpmaniax WP DB Booster

0
Medium
VulnerabilityCVE-2025-14168cvecve-2025-14168cwe-352
Published: Sat Dec 20 2025 (12/20/2025, 03:20:24 UTC)
Source: CVE Database V5
Vendor/Project: wpmaniax
Product: WP DB Booster

Description

The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/27/2025, 04:23:56 UTC

Technical Analysis

CVE-2025-14168 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WP DB Booster plugin for WordPress, specifically in all versions up to and including 1.0.1. The vulnerability stems from the absence of nonce validation on the cleanup_all AJAX action endpoint. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without this validation, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), triggers the cleanup_all action. This action deletes various database records including post drafts, revisions, comments, and metadata, which compromises the integrity of the website's content management system. The vulnerability does not require the attacker to be authenticated but does require user interaction from an administrator. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the limited scope of impact (integrity only), no confidentiality or availability impact, and the need for user interaction. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-352, which covers CSRF attacks that exploit the trust a site has in a user's browser. This vulnerability can be leveraged to disrupt content management workflows and potentially cause data loss or corruption, impacting website reliability and editorial processes.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential loss or corruption of website content and metadata managed through WordPress sites using the WP DB Booster plugin. This can disrupt business operations, especially for media companies, e-commerce platforms, and public sector websites relying on WordPress for content management. Although the vulnerability does not directly expose sensitive data or cause denial of service, the integrity loss can lead to reputational damage, operational delays, and increased recovery costs. Organizations with multiple administrators or less stringent user access controls are at higher risk. The requirement for user interaction (administrator clicking a malicious link) means that social engineering or phishing campaigns could be used to exploit this vulnerability. Given the widespread use of WordPress across Europe, especially in small to medium enterprises and public institutions, the risk is non-negligible. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation. Attackers targeting European entities with valuable content or political significance could leverage this vulnerability to disrupt services or manipulate published information.

Mitigation Recommendations

1. Monitor for and apply official updates or patches from the WP DB Booster plugin vendor as soon as they become available. 2. Until patches are released, restrict administrative access to trusted personnel and minimize the number of users with high-level privileges. 3. Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack vectors. 4. Employ a Web Application Firewall (WAF) capable of detecting and blocking CSRF attempts and suspicious AJAX requests targeting the cleanup_all action. 5. Educate administrators about phishing and social engineering risks, emphasizing caution when clicking on unsolicited links. 6. Consider disabling or removing the WP DB Booster plugin if it is not essential to reduce the attack surface. 7. Regularly back up WordPress databases and content to enable quick restoration in case of data loss. 8. Use security plugins that enforce nonce validation or add additional CSRF protections on AJAX endpoints. 9. Audit and monitor logs for unusual AJAX requests or administrative actions that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T21:24:56.492Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694619d2c376abdb7ecb86bd

Added to database: 12/20/2025, 3:36:50 AM

Last enriched: 12/27/2025, 4:23:56 AM

Last updated: 2/7/2026, 5:36:00 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats