CVE-2025-15041: CWE-862 Missing Authorization in wp_media BackWPup – WordPress Backup & Restore Plugin
The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the save_site_option() function in all versions up to, and including, 5.6.2. This makes it possible for authenticated attackers, with level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI Analysis
Technical Summary
CVE-2025-15041 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BackWPup – WordPress Backup & Restore Plugin, a widely used WordPress plugin for backup management. The flaw exists because the save_site_option() function lacks proper capability checks, allowing authenticated users with at least level access (such as contributors or editors) to modify arbitrary site options. This missing authorization enables attackers to escalate privileges by changing critical settings like the default user role for new registrations to 'administrator' and enabling user registration. Consequently, an attacker can create new administrative accounts without needing higher privileges initially. The vulnerability affects all versions up to 5.6.2 and does not require user interaction, but it does require the attacker to be authenticated with some level of access. The CVSS v3.1 score of 7.2 reflects a high severity due to the network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk of complete site compromise if exploited. The plugin’s widespread use in WordPress environments makes this a critical issue for website administrators and security teams to address.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the BackWPup plugin installed. Successful exploitation can lead to full administrative control over affected websites, allowing attackers to manipulate content, steal sensitive data, deploy malware, or disrupt services. This can result in reputational damage, data breaches involving personal data protected under GDPR, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and media, which often use WordPress for public-facing websites, are particularly vulnerable. The ability to escalate privileges from lower-level authenticated users means that even compromised or less privileged accounts can be leveraged for a full site takeover. This elevates the threat landscape for European entities, increasing the likelihood of targeted attacks or opportunistic exploitation by cybercriminals. Additionally, the lack of public exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability is widely known.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the BackWPup plugin to a version that includes the necessary authorization checks once available. Until a patch is released, organizations should restrict plugin access to only trusted administrators and disable user registration if not required. Implementing strict role-based access controls (RBAC) within WordPress to limit the number of users with editing or higher privileges can reduce the attack surface. Monitoring and auditing changes to site options and user roles can help detect suspicious activity early. Employing Web Application Firewalls (WAFs) with custom rules to block unauthorized attempts to invoke the save_site_option() function may provide temporary protection. Additionally, organizations should enforce strong authentication mechanisms and consider multi-factor authentication (MFA) for all users with elevated privileges. Regular backups and incident response plans should be reviewed and tested to ensure rapid recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15041: CWE-862 Missing Authorization in wp_media BackWPup – WordPress Backup & Restore Plugin
Description
The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the save_site_option() function in all versions up to, and including, 5.6.2. This makes it possible for authenticated attackers, with level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI-Powered Analysis
Technical Analysis
CVE-2025-15041 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BackWPup – WordPress Backup & Restore Plugin, a widely used WordPress plugin for backup management. The flaw exists because the save_site_option() function lacks proper capability checks, allowing authenticated users with at least level access (such as contributors or editors) to modify arbitrary site options. This missing authorization enables attackers to escalate privileges by changing critical settings like the default user role for new registrations to 'administrator' and enabling user registration. Consequently, an attacker can create new administrative accounts without needing higher privileges initially. The vulnerability affects all versions up to 5.6.2 and does not require user interaction, but it does require the attacker to be authenticated with some level of access. The CVSS v3.1 score of 7.2 reflects a high severity due to the network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk of complete site compromise if exploited. The plugin’s widespread use in WordPress environments makes this a critical issue for website administrators and security teams to address.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the BackWPup plugin installed. Successful exploitation can lead to full administrative control over affected websites, allowing attackers to manipulate content, steal sensitive data, deploy malware, or disrupt services. This can result in reputational damage, data breaches involving personal data protected under GDPR, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and media, which often use WordPress for public-facing websites, are particularly vulnerable. The ability to escalate privileges from lower-level authenticated users means that even compromised or less privileged accounts can be leveraged for a full site takeover. This elevates the threat landscape for European entities, increasing the likelihood of targeted attacks or opportunistic exploitation by cybercriminals. Additionally, the lack of public exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability is widely known.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the BackWPup plugin to a version that includes the necessary authorization checks once available. Until a patch is released, organizations should restrict plugin access to only trusted administrators and disable user registration if not required. Implementing strict role-based access controls (RBAC) within WordPress to limit the number of users with editing or higher privileges can reduce the attack surface. Monitoring and auditing changes to site options and user roles can help detect suspicious activity early. Employing Web Application Firewalls (WAFs) with custom rules to block unauthorized attempts to invoke the save_site_option() function may provide temporary protection. Additionally, organizations should enforce strong authentication mechanisms and consider multi-factor authentication (MFA) for all users with elevated privileges. Regular backups and incident response plans should be reviewed and tested to ensure rapid recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-23T12:23:58.877Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f46aea4a407a3be0b1
Added to database: 2/19/2026, 4:56:20 AM
Last enriched: 2/19/2026, 5:11:28 AM
Last updated: 2/21/2026, 12:16:01 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.