Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24571: Missing Authorization in Epsiloncool WP Fast Total Search

0
Unknown
VulnerabilityCVE-2025-24571cvecve-2025-24571
Published: Fri Jan 24 2025 (01/24/2025, 17:24:18 UTC)
Source: CVE Database V5
Vendor/Project: Epsiloncool
Product: WP Fast Total Search

Description

Missing Authorization vulnerability in Epsiloncool WP Fast Total Search fulltext-search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Fast Total Search: from n/a through <= 1.78.258.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:06:57 UTC

Technical Analysis

CVE-2025-24571 identifies a missing authorization vulnerability in the Epsiloncool WP Fast Total Search plugin for WordPress, specifically affecting versions up to and including 1.78.258. The vulnerability arises from improperly configured access control mechanisms within the plugin’s full-text search functionality, which fails to enforce proper authorization checks. This allows an attacker to bypass security controls and potentially access or manipulate search-related data without appropriate permissions. The vulnerability is classified as a missing authorization issue, which is a common security flaw where the system does not verify whether the requester has the right to perform certain actions. Although no exploits have been reported in the wild, the flaw’s presence in a widely used WordPress plugin increases the risk of exploitation. The plugin enhances WordPress search capabilities by providing full-text search features, which may expose sensitive content if accessed without authorization. The vulnerability does not require user interaction but does require the attacker to send crafted requests to the plugin’s search interface. No CVSS score has been assigned yet, and no patches have been officially released, though the vulnerability was published on January 24, 2025. The issue was reserved and assigned by Patchstack, a known vulnerability database for WordPress plugins. The absence of patches means that affected users must implement interim mitigations to reduce risk. This vulnerability highlights the importance of rigorous access control validation in WordPress plugins, especially those handling content search and retrieval.

Potential Impact

The missing authorization vulnerability in WP Fast Total Search can lead to unauthorized access to search functionalities, potentially exposing sensitive or restricted content indexed by the plugin. This could compromise confidentiality if sensitive data is retrievable by unauthorized users. Integrity could also be impacted if attackers manipulate search queries or results, potentially misleading users or administrators. Availability impact is less direct but could occur if attackers exploit the flaw to overload the search system or cause denial of service. Organizations relying on this plugin for enhanced search capabilities face risks of data leakage and unauthorized information disclosure. Since WordPress powers a significant portion of websites globally, including business, government, and personal sites, the scope of affected systems is broad. Attackers do not require user interaction, increasing the ease of exploitation, though some technical knowledge is needed to craft requests. The absence of authentication requirements for the vulnerable functionality further elevates risk. The overall impact includes reputational damage, regulatory compliance issues if sensitive data is exposed, and potential operational disruptions. Until patches are available, organizations remain vulnerable to targeted attacks exploiting this flaw.

Mitigation Recommendations

1. Immediately restrict access to the WP Fast Total Search plugin’s search endpoints by implementing web application firewall (WAF) rules or server-level access controls limiting requests to trusted IP addresses or authenticated users only. 2. Disable or deactivate the WP Fast Total Search plugin if full-text search functionality is not critical, to eliminate the attack surface. 3. Monitor web server and application logs for unusual or unauthorized access attempts targeting the search functionality, and set up alerts for suspicious patterns. 4. Apply principle of least privilege to WordPress user roles, ensuring only necessary users have permissions related to search and plugin management. 5. Stay informed on vendor announcements and Patchstack updates for official patches or security advisories, and apply updates promptly once available. 6. Consider deploying runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect and block exploitation attempts in real time. 7. Conduct a security review of other installed WordPress plugins to identify and remediate similar access control weaknesses. 8. Educate site administrators about the risks of missing authorization vulnerabilities and the importance of timely patching and access control enforcement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:50:32.998Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7262e6bfc5ba1dee93a7

Added to database: 4/1/2026, 7:30:42 PM

Last enriched: 4/1/2026, 9:06:57 PM

Last updated: 4/6/2026, 9:23:43 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses