CVE-2025-14608: CWE-862 Missing Authorization in infosatech WP Last Modified Info
The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.5. This is due to the plugin not validating a user's access to a post before modifying its metadata in the 'bulk_save' AJAX action. This makes it possible for authenticated attackers, with Author-level access and above, to update the last modified metadata and lock the modification date of arbitrary posts, including those created by Administrators via the 'post_ids' parameter.
AI Analysis
Technical Summary
The WP Last Modified Info plugin for WordPress, widely used to display or manage the last modification date of posts, suffers from an authorization bypass vulnerability identified as CVE-2025-14608. The root cause is a missing authorization check in the 'bulk_save' AJAX action handler, which processes requests to update post metadata. Specifically, the plugin fails to verify whether the authenticated user has permission to modify the targeted posts before updating their 'last modified' metadata. This flaw allows any user with Author-level privileges or higher to manipulate the 'post_ids' parameter to update or lock the modification dates of arbitrary posts, including those authored by Administrators. The vulnerability is classified as CWE-862 (Missing Authorization) and constitutes an insecure direct object reference (IDOR) issue. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but the impact is limited to integrity without affecting confidentiality or availability. There are no known exploits in the wild, and no patches have been released as of the publication date. This vulnerability could be leveraged to mislead users or administrators about the recency or authenticity of content changes, potentially undermining trust or complicating audit trails.
Potential Impact
For European organizations, the primary impact of CVE-2025-14608 lies in the integrity of content management systems running WordPress with the vulnerable WP Last Modified Info plugin. Unauthorized modification of post metadata can disrupt content auditing, compliance reporting, and editorial workflows, especially in regulated sectors such as finance, healthcare, and government where accurate record-keeping is critical. While the vulnerability does not expose sensitive data or cause service disruption, it can be exploited by malicious insiders or compromised accounts to obscure unauthorized content changes or create confusion about document timelines. This may indirectly facilitate misinformation, reduce stakeholder trust, or complicate forensic investigations. Organizations relying heavily on WordPress for publishing or internal communications should consider the reputational and operational risks associated with manipulated content metadata.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict Author-level and higher privileges to trusted users only, minimizing the attack surface. 2) Monitor WordPress logs and plugin-specific metadata changes for unusual or unauthorized modification patterns, especially bulk updates via AJAX. 3) Implement additional access control mechanisms at the web application firewall (WAF) or reverse proxy level to detect and block suspicious 'bulk_save' AJAX requests with unexpected 'post_ids' parameters. 4) Temporarily disable or remove the WP Last Modified Info plugin if feasible until an official patch is released. 5) Engage with the plugin vendor or community to track patch availability and apply updates promptly once released. 6) Conduct regular audits of post metadata integrity and cross-verify modification dates with other logs or version control systems. 7) Educate content managers and administrators about the risk of privilege misuse and enforce strong authentication and session management practices to prevent account compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14608: CWE-862 Missing Authorization in infosatech WP Last Modified Info
Description
The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.5. This is due to the plugin not validating a user's access to a post before modifying its metadata in the 'bulk_save' AJAX action. This makes it possible for authenticated attackers, with Author-level access and above, to update the last modified metadata and lock the modification date of arbitrary posts, including those created by Administrators via the 'post_ids' parameter.
AI-Powered Analysis
Technical Analysis
The WP Last Modified Info plugin for WordPress, widely used to display or manage the last modification date of posts, suffers from an authorization bypass vulnerability identified as CVE-2025-14608. The root cause is a missing authorization check in the 'bulk_save' AJAX action handler, which processes requests to update post metadata. Specifically, the plugin fails to verify whether the authenticated user has permission to modify the targeted posts before updating their 'last modified' metadata. This flaw allows any user with Author-level privileges or higher to manipulate the 'post_ids' parameter to update or lock the modification dates of arbitrary posts, including those authored by Administrators. The vulnerability is classified as CWE-862 (Missing Authorization) and constitutes an insecure direct object reference (IDOR) issue. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but the impact is limited to integrity without affecting confidentiality or availability. There are no known exploits in the wild, and no patches have been released as of the publication date. This vulnerability could be leveraged to mislead users or administrators about the recency or authenticity of content changes, potentially undermining trust or complicating audit trails.
Potential Impact
For European organizations, the primary impact of CVE-2025-14608 lies in the integrity of content management systems running WordPress with the vulnerable WP Last Modified Info plugin. Unauthorized modification of post metadata can disrupt content auditing, compliance reporting, and editorial workflows, especially in regulated sectors such as finance, healthcare, and government where accurate record-keeping is critical. While the vulnerability does not expose sensitive data or cause service disruption, it can be exploited by malicious insiders or compromised accounts to obscure unauthorized content changes or create confusion about document timelines. This may indirectly facilitate misinformation, reduce stakeholder trust, or complicate forensic investigations. Organizations relying heavily on WordPress for publishing or internal communications should consider the reputational and operational risks associated with manipulated content metadata.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict Author-level and higher privileges to trusted users only, minimizing the attack surface. 2) Monitor WordPress logs and plugin-specific metadata changes for unusual or unauthorized modification patterns, especially bulk updates via AJAX. 3) Implement additional access control mechanisms at the web application firewall (WAF) or reverse proxy level to detect and block suspicious 'bulk_save' AJAX requests with unexpected 'post_ids' parameters. 4) Temporarily disable or remove the WP Last Modified Info plugin if feasible until an official patch is released. 5) Engage with the plugin vendor or community to track patch availability and apply updates promptly once released. 6) Conduct regular audits of post metadata integrity and cross-verify modification dates with other logs or version control systems. 7) Educate content managers and administrators about the risk of privilege misuse and enforce strong authentication and session management practices to prevent account compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-12T20:11:33.221Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901846c9e1ff5ad867f1e0
Added to database: 2/14/2026, 6:37:58 AM
Last enriched: 2/14/2026, 6:38:54 AM
Last updated: 2/21/2026, 12:17:31 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.