Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14342: CWE-862 Missing Authorization in cifi SEO Plugin by Squirrly SEO

0
Medium
VulnerabilityCVE-2025-14342cvecve-2025-14342cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:16 UTC)
Source: CVE Database V5
Vendor/Project: cifi
Product: SEO Plugin by Squirrly SEO

Description

The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sq_ajax_uninstall function in all versions up to, and including, 12.4.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to disconnect the site from Squirrly's cloud service.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:28:14 UTC

Technical Analysis

CVE-2025-14342 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Squirrly SEO plugin for WordPress. The flaw exists in the sq_ajax_uninstall function, which lacks proper capability checks before allowing execution. This omission enables any authenticated user with at least Subscriber-level privileges to invoke this function and disconnect the WordPress site from Squirrly's cloud service. The impact is limited to unauthorized modification of the plugin's operational state, specifically severing the connection to the cloud service, which could degrade SEO functionality or disrupt analytics and cloud-based features provided by Squirrly. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require authentication with a low-level role, which is commonly assigned to registered users or subscribers on WordPress sites. The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but acknowledging the integrity impact. No known public exploits or patches have been reported as of the publication date. This vulnerability highlights the importance of enforcing strict authorization checks on AJAX endpoints in WordPress plugins, especially those that can alter plugin state or connectivity to external services.

Potential Impact

For European organizations, the primary impact is the unauthorized disruption of SEO plugin functionality, which can impair website search engine optimization efforts and potentially affect web traffic and business visibility. While this does not directly compromise sensitive data or site availability, it can degrade the effectiveness of marketing and analytics operations dependent on Squirrly's cloud services. Organizations relying heavily on WordPress for their web presence and using the Squirrly SEO plugin are at risk of having their SEO service connection disabled by low-privilege users, which could be exploited internally or by attackers who have compromised low-level accounts. This could lead to reduced site ranking, loss of competitive advantage, and additional operational overhead to detect and remediate unauthorized changes. The risk is heightened in environments with many registered users or where subscriber roles are broadly assigned without strict access controls.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit and restrict Subscriber-level permissions to trusted users only, minimizing the risk of unauthorized actions. Administrators should monitor plugin activity logs for unusual disconnection events from Squirrly's cloud service. Until an official patch is released, consider temporarily disabling or replacing the Squirrly SEO plugin if feasible. Implement role-based access controls to ensure only trusted users have authenticated access to WordPress backends. Additionally, security teams should review and harden AJAX endpoint authorization checks in custom or third-party plugins. Regularly update WordPress core and plugins once patches become available. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting the vulnerable function. Finally, educate site administrators and users about the risks of granting unnecessary privileges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T14:21:18.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f36aea4a407a3be073

Added to database: 2/19/2026, 4:56:19 AM

Last enriched: 2/19/2026, 5:28:14 AM

Last updated: 2/21/2026, 12:16:54 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats