Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14608: CWE-862 Missing Authorization in infosatech WP Last Modified Info

0
Medium
VulnerabilityCVE-2025-14608cvecve-2025-14608cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 03:25:28 UTC)
Source: CVE Database V5
Vendor/Project: infosatech
Product: WP Last Modified Info

Description

The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.5. This is due to the plugin not validating a user's access to a post before modifying its metadata in the 'bulk_save' AJAX action. This makes it possible for authenticated attackers, with Author-level access and above, to update the last modified metadata and lock the modification date of arbitrary posts, including those created by Administrators via the 'post_ids' parameter.

AI-Powered Analysis

AILast updated: 02/14/2026, 06:38:54 UTC

Technical Analysis

The WP Last Modified Info plugin for WordPress, widely used to display or manage the last modification date of posts, suffers from an authorization bypass vulnerability identified as CVE-2025-14608. The root cause is a missing authorization check in the 'bulk_save' AJAX action handler, which processes requests to update post metadata. Specifically, the plugin fails to verify whether the authenticated user has permission to modify the targeted posts before updating their 'last modified' metadata. This flaw allows any user with Author-level privileges or higher to manipulate the 'post_ids' parameter to update or lock the modification dates of arbitrary posts, including those authored by Administrators. The vulnerability is classified as CWE-862 (Missing Authorization) and constitutes an insecure direct object reference (IDOR) issue. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but the impact is limited to integrity without affecting confidentiality or availability. There are no known exploits in the wild, and no patches have been released as of the publication date. This vulnerability could be leveraged to mislead users or administrators about the recency or authenticity of content changes, potentially undermining trust or complicating audit trails.

Potential Impact

For European organizations, the primary impact of CVE-2025-14608 lies in the integrity of content management systems running WordPress with the vulnerable WP Last Modified Info plugin. Unauthorized modification of post metadata can disrupt content auditing, compliance reporting, and editorial workflows, especially in regulated sectors such as finance, healthcare, and government where accurate record-keeping is critical. While the vulnerability does not expose sensitive data or cause service disruption, it can be exploited by malicious insiders or compromised accounts to obscure unauthorized content changes or create confusion about document timelines. This may indirectly facilitate misinformation, reduce stakeholder trust, or complicate forensic investigations. Organizations relying heavily on WordPress for publishing or internal communications should consider the reputational and operational risks associated with manipulated content metadata.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately restrict Author-level and higher privileges to trusted users only, minimizing the attack surface. 2) Monitor WordPress logs and plugin-specific metadata changes for unusual or unauthorized modification patterns, especially bulk updates via AJAX. 3) Implement additional access control mechanisms at the web application firewall (WAF) or reverse proxy level to detect and block suspicious 'bulk_save' AJAX requests with unexpected 'post_ids' parameters. 4) Temporarily disable or remove the WP Last Modified Info plugin if feasible until an official patch is released. 5) Engage with the plugin vendor or community to track patch availability and apply updates promptly once released. 6) Conduct regular audits of post metadata integrity and cross-verify modification dates with other logs or version control systems. 7) Educate content managers and administrators about the risk of privilege misuse and enforce strong authentication and session management practices to prevent account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T20:11:33.221Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901846c9e1ff5ad867f1e0

Added to database: 2/14/2026, 6:37:58 AM

Last enriched: 2/14/2026, 6:38:54 AM

Last updated: 2/21/2026, 12:17:31 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats