CVE-2025-14168: CWE-352 Cross-Site Request Forgery (CSRF) in wpmaniax WP DB Booster
The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-14168 is a security vulnerability classified as CWE-352 (Cross-Site Request Forgery) found in the WP DB Booster plugin for WordPress, affecting all versions up to and including 1.0.1. The root cause is the absence of nonce validation on the cleanup_all AJAX action, which is a mechanism designed to prevent unauthorized commands from being executed. Without this protection, an attacker can craft a malicious request that, when an authenticated site administrator interacts with it (e.g., by clicking a link), triggers the deletion of critical database records such as post drafts, revisions, comments, and metadata. This attack vector does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a targeted but feasible threat. The vulnerability impacts the integrity of the WordPress site's data by allowing unauthorized deletion but does not affect confidentiality or availability directly. The CVSS v3.1 base score is 4.3, reflecting a medium severity level, with the attack vector being network-based, low attack complexity, no privileges required, but requiring user interaction. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability is significant for organizations relying on WP DB Booster for database optimization and cleanup, as it could lead to data loss and disruption of content management workflows.
Potential Impact
For European organizations, this vulnerability could result in unauthorized deletion of important WordPress database content, including drafts, revisions, comments, and metadata, potentially disrupting content management and editorial workflows. This can lead to loss of critical data, increased recovery time, and operational downtime for websites relying on WP DB Booster. While it does not directly compromise confidentiality or availability, the integrity loss can affect trustworthiness of published content and user engagement. Organizations with high reliance on WordPress for public-facing websites, e-commerce, or internal portals could face reputational damage and operational setbacks. The requirement for administrator interaction means social engineering could be used to exploit this vulnerability, increasing the risk in environments where administrators are less security-aware. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the impact could be significant if exploited at scale.
Mitigation Recommendations
1. Immediately update the WP DB Booster plugin to a patched version once available from the vendor. 2. Until a patch is released, disable or remove the WP DB Booster plugin to eliminate the attack surface. 3. Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts or forge requests. 4. Educate WordPress administrators about the risks of clicking on untrusted links, especially those received via email or messaging platforms. 5. Use web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the cleanup_all action. 6. Regularly back up WordPress databases and test restoration procedures to minimize data loss impact. 7. Monitor logs for unusual AJAX activity or unexpected database cleanup actions. 8. Consider deploying multi-factor authentication (MFA) for WordPress admin accounts to reduce risk from compromised credentials, even though this vulnerability does not require authentication.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-14168: CWE-352 Cross-Site Request Forgery (CSRF) in wpmaniax WP DB Booster
Description
The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-14168 is a security vulnerability classified as CWE-352 (Cross-Site Request Forgery) found in the WP DB Booster plugin for WordPress, affecting all versions up to and including 1.0.1. The root cause is the absence of nonce validation on the cleanup_all AJAX action, which is a mechanism designed to prevent unauthorized commands from being executed. Without this protection, an attacker can craft a malicious request that, when an authenticated site administrator interacts with it (e.g., by clicking a link), triggers the deletion of critical database records such as post drafts, revisions, comments, and metadata. This attack vector does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a targeted but feasible threat. The vulnerability impacts the integrity of the WordPress site's data by allowing unauthorized deletion but does not affect confidentiality or availability directly. The CVSS v3.1 base score is 4.3, reflecting a medium severity level, with the attack vector being network-based, low attack complexity, no privileges required, but requiring user interaction. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability is significant for organizations relying on WP DB Booster for database optimization and cleanup, as it could lead to data loss and disruption of content management workflows.
Potential Impact
For European organizations, this vulnerability could result in unauthorized deletion of important WordPress database content, including drafts, revisions, comments, and metadata, potentially disrupting content management and editorial workflows. This can lead to loss of critical data, increased recovery time, and operational downtime for websites relying on WP DB Booster. While it does not directly compromise confidentiality or availability, the integrity loss can affect trustworthiness of published content and user engagement. Organizations with high reliance on WordPress for public-facing websites, e-commerce, or internal portals could face reputational damage and operational setbacks. The requirement for administrator interaction means social engineering could be used to exploit this vulnerability, increasing the risk in environments where administrators are less security-aware. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the impact could be significant if exploited at scale.
Mitigation Recommendations
1. Immediately update the WP DB Booster plugin to a patched version once available from the vendor. 2. Until a patch is released, disable or remove the WP DB Booster plugin to eliminate the attack surface. 3. Implement strict Content Security Policy (CSP) headers to limit the ability of attackers to execute malicious scripts or forge requests. 4. Educate WordPress administrators about the risks of clicking on untrusted links, especially those received via email or messaging platforms. 5. Use web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the cleanup_all action. 6. Regularly back up WordPress databases and test restoration procedures to minimize data loss impact. 7. Monitor logs for unusual AJAX activity or unexpected database cleanup actions. 8. Consider deploying multi-factor authentication (MFA) for WordPress admin accounts to reduce risk from compromised credentials, even though this vulnerability does not require authentication.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T21:24:56.492Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694619d2c376abdb7ecb86bd
Added to database: 12/20/2025, 3:36:50 AM
Last enriched: 12/20/2025, 3:52:55 AM
Last updated: 12/20/2025, 8:14:47 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14734: CWE-352 Cross-Site Request Forgery (CSRF) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14721: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mansoormunib RESPONSIVE AND SWIPE SLIDER!
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.