CVE-2025-15445: CWE-862 Missing Authorization in Restaurant Cafeteria
The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-ajax actions without nonce or capability checks, allowing any logged-in user, like subscriber, to perform privileged operations. An attacker can install and activate a from a user-supplied URL, leading to arbitrary PHP code execution, and also import demo content that rewrites site configuration, including Restaurant Cafeteria WordPress theme through 0.4.6_mods, pages, menus, and front page settings.
AI Analysis
Technical Summary
CVE-2025-15445 affects the Restaurant Cafeteria WordPress theme through version 0.4.6 by exposing insecure admin-ajax actions that lack nonce or capability checks. This missing authorization allows any logged-in user, such as a subscriber, to execute privileged operations. Specifically, an attacker can install and activate arbitrary PHP code from a user-supplied URL and import demo content that overwrites site configurations including theme modifications, pages, menus, and front page settings. The vulnerability is identified as CWE-862 and carries a CVSS 3.1 base score of 5.4, indicating a medium severity level. There is no indication of known exploits in the wild or available patches at this time.
Potential Impact
An attacker with any logged-in user privileges can exploit this vulnerability to execute arbitrary PHP code on the affected WordPress site. This can lead to unauthorized modification of site configuration, including theme settings, pages, menus, and front page layout. While the confidentiality and integrity impacts are low to medium, the ability to execute arbitrary code poses a significant risk to site security and stability. There is no evidence of active exploitation in the wild as of the published date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict user roles to trusted individuals and limit login access. Monitor for updates from the theme developer or WordPress security channels regarding patches or temporary mitigations. Avoid installing or activating untrusted plugins or themes that could be leveraged in conjunction with this vulnerability.
CVE-2025-15445: CWE-862 Missing Authorization in Restaurant Cafeteria
Description
The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-ajax actions without nonce or capability checks, allowing any logged-in user, like subscriber, to perform privileged operations. An attacker can install and activate a from a user-supplied URL, leading to arbitrary PHP code execution, and also import demo content that rewrites site configuration, including Restaurant Cafeteria WordPress theme through 0.4.6_mods, pages, menus, and front page settings.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15445 affects the Restaurant Cafeteria WordPress theme through version 0.4.6 by exposing insecure admin-ajax actions that lack nonce or capability checks. This missing authorization allows any logged-in user, such as a subscriber, to execute privileged operations. Specifically, an attacker can install and activate arbitrary PHP code from a user-supplied URL and import demo content that overwrites site configurations including theme modifications, pages, menus, and front page settings. The vulnerability is identified as CWE-862 and carries a CVSS 3.1 base score of 5.4, indicating a medium severity level. There is no indication of known exploits in the wild or available patches at this time.
Potential Impact
An attacker with any logged-in user privileges can exploit this vulnerability to execute arbitrary PHP code on the affected WordPress site. This can lead to unauthorized modification of site configuration, including theme settings, pages, menus, and front page layout. While the confidentiality and integrity impacts are low to medium, the ability to execute arbitrary code poses a significant risk to site security and stability. There is no evidence of active exploitation in the wild as of the published date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict user roles to trusted individuals and limit login access. Monitor for updates from the theme developer or WordPress security channels regarding patches or temporary mitigations. Avoid installing or activating untrusted plugins or themes that could be leveraged in conjunction with this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2026-01-04T05:55:18.233Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c7734a2b68dbd88eabfb65
Added to database: 3/28/2026, 6:20:58 AM
Last enriched: 4/4/2026, 6:41:10 AM
Last updated: 5/12/2026, 2:54:09 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.