Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15041: CWE-862 Missing Authorization in wp_media BackWPup – WordPress Backup & Restore Plugin

0
High
VulnerabilityCVE-2025-15041cvecve-2025-15041cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:07 UTC)
Source: CVE Database V5
Vendor/Project: wp_media
Product: BackWPup – WordPress Backup & Restore Plugin

Description

The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the save_site_option() function in all versions up to, and including, 5.6.2. This makes it possible for authenticated attackers, with level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:11:28 UTC

Technical Analysis

CVE-2025-15041 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BackWPup – WordPress Backup & Restore Plugin, a widely used WordPress plugin for backup management. The flaw exists because the save_site_option() function lacks proper capability checks, allowing authenticated users with at least level access (such as contributors or editors) to modify arbitrary site options. This missing authorization enables attackers to escalate privileges by changing critical settings like the default user role for new registrations to 'administrator' and enabling user registration. Consequently, an attacker can create new administrative accounts without needing higher privileges initially. The vulnerability affects all versions up to 5.6.2 and does not require user interaction, but it does require the attacker to be authenticated with some level of access. The CVSS v3.1 score of 7.2 reflects a high severity due to the network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk of complete site compromise if exploited. The plugin’s widespread use in WordPress environments makes this a critical issue for website administrators and security teams to address.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the BackWPup plugin installed. Successful exploitation can lead to full administrative control over affected websites, allowing attackers to manipulate content, steal sensitive data, deploy malware, or disrupt services. This can result in reputational damage, data breaches involving personal data protected under GDPR, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and media, which often use WordPress for public-facing websites, are particularly vulnerable. The ability to escalate privileges from lower-level authenticated users means that even compromised or less privileged accounts can be leveraged for a full site takeover. This elevates the threat landscape for European entities, increasing the likelihood of targeted attacks or opportunistic exploitation by cybercriminals. Additionally, the lack of public exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability is widely known.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately update the BackWPup plugin to a version that includes the necessary authorization checks once available. Until a patch is released, organizations should restrict plugin access to only trusted administrators and disable user registration if not required. Implementing strict role-based access controls (RBAC) within WordPress to limit the number of users with editing or higher privileges can reduce the attack surface. Monitoring and auditing changes to site options and user roles can help detect suspicious activity early. Employing Web Application Firewalls (WAFs) with custom rules to block unauthorized attempts to invoke the save_site_option() function may provide temporary protection. Additionally, organizations should enforce strong authentication mechanisms and consider multi-factor authentication (MFA) for all users with elevated privileges. Regular backups and incident response plans should be reviewed and tested to ensure rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-23T12:23:58.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f46aea4a407a3be0b1

Added to database: 2/19/2026, 4:56:20 AM

Last enriched: 2/19/2026, 5:11:28 AM

Last updated: 2/21/2026, 12:16:01 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats