Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30894: Missing Authorization in Epsiloncool WP Fast Total Search

0
Unknown
VulnerabilityCVE-2025-30894cvecve-2025-30894
Published: Thu Mar 27 2025 (03/27/2025, 10:55:46 UTC)
Source: CVE Database V5
Vendor/Project: Epsiloncool
Product: WP Fast Total Search

Description

Missing Authorization vulnerability in Epsiloncool WP Fast Total Search fulltext-search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Fast Total Search: from n/a through <= 1.79.262.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:39:09 UTC

Technical Analysis

CVE-2025-30894 identifies a Missing Authorization vulnerability in the Epsiloncool WP Fast Total Search plugin for WordPress, affecting versions up to 1.79.262. The vulnerability arises from incorrectly configured access control mechanisms within the fulltext-search functionality, allowing attackers to bypass authorization checks. This means that unauthorized users can potentially access or manipulate search-related data or functionality that should be restricted. The plugin is widely used to enhance WordPress site search capabilities, making the vulnerability relevant to many websites globally. Although no public exploits are known at this time, the lack of proper authorization checks presents a significant security risk. The vulnerability does not require user authentication, which lowers the barrier for exploitation. The absence of a CVSS score suggests the need for a manual severity assessment, which is high due to the potential for unauthorized data access and integrity compromise. The vulnerability was published on March 27, 2025, with no patches currently available, emphasizing the need for immediate attention from site administrators. The issue is tracked by Patchstack and is publicly documented in the CVE database. Organizations relying on this plugin should monitor for vendor updates and consider temporary mitigations to prevent exploitation.

Potential Impact

The impact of CVE-2025-30894 on organizations worldwide can be significant. Unauthorized access to the fulltext search functionality may lead to exposure of sensitive data indexed or accessible via the search feature, compromising confidentiality. Attackers might also manipulate search results or functionality, affecting data integrity and user trust. Since WordPress powers a large portion of the web, including e-commerce, corporate, and governmental sites, exploitation could lead to reputational damage, data breaches, and potential regulatory consequences. The ease of exploitation without authentication increases the threat level, potentially allowing automated attacks at scale. The vulnerability could be leveraged as a foothold for further attacks within compromised environments. Organizations with public-facing WordPress sites using this plugin are particularly at risk, especially if they host sensitive or proprietary information accessible through search. The lack of current exploits in the wild provides a window for proactive mitigation, but the risk remains high due to the nature of the flaw.

Mitigation Recommendations

To mitigate CVE-2025-30894, organizations should immediately audit their WordPress installations to identify the presence of the WP Fast Total Search plugin and verify the version in use. Until an official patch is released by Epsiloncool, it is advisable to disable or uninstall the plugin to eliminate the attack surface. If disabling the plugin is not feasible, restrict access to the WordPress admin interface and search functionality using web application firewalls (WAFs), IP whitelisting, or other network controls to limit exposure. Monitor web server and application logs for unusual access patterns related to search queries or plugin endpoints. Keep abreast of vendor announcements for patches or updates addressing this vulnerability and apply them promptly once available. Additionally, implement strong WordPress security best practices such as least privilege user roles, regular backups, and timely updates of all plugins and core software. Consider deploying runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect and block exploitation attempts. Finally, educate site administrators about this vulnerability and the importance of rapid response to plugin security issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:21:31.390Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd732fe6bfc5ba1def0c23

Added to database: 4/1/2026, 7:34:07 PM

Last enriched: 4/2/2026, 12:39:09 AM

Last updated: 4/6/2026, 9:24:32 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses