CVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
AI Analysis
Technical Summary
CVE-2025-6043 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Malcure Malware Scanner plugin for WordPress, a popular toolset for malware removal. The vulnerability arises from the lack of a capability check in the wpmr_delete_file() function, which is responsible for deleting files. This missing authorization allows any authenticated user with at least Subscriber-level privileges to invoke this function and delete arbitrary files on the server. The deletion of arbitrary files can be leveraged to remove critical WordPress or server files, potentially enabling remote code execution (RCE) by attackers. The vulnerability is present in all plugin versions up to and including 16.8 and requires that the WordPress site has advanced mode enabled, which likely exposes additional functionality or endpoints. The CVSS v3.1 base score is 8.1, reflecting a high severity due to the ease of exploitation (low attack complexity), the requirement of only low privileges (PR:L), no user interaction, and the significant impact on integrity and availability. The vulnerability is network exploitable and does not affect confidentiality directly but can lead to severe consequences through integrity and availability compromise. No patches have been officially released at the time of publication, and no known exploits have been reported in the wild. The vulnerability was reserved and published by Wordfence in mid-2025.
Potential Impact
The vulnerability allows attackers with minimal privileges (Subscriber-level) to delete arbitrary files on the server, which can lead to remote code execution, site defacement, data loss, or complete site downtime. For organizations relying on WordPress with the Malcure plugin, this can result in significant operational disruption, reputational damage, and potential data breaches if attackers leverage the file deletion to implant backdoors or remove security-critical files. Since WordPress powers a large portion of websites globally, especially small to medium businesses and content-driven sites, the impact is widespread. The requirement for advanced mode to be enabled limits the attack surface somewhat but does not eliminate risk, especially in environments where advanced mode is enabled for enhanced scanning or management features. The vulnerability undermines the integrity and availability of affected sites, potentially allowing attackers to escalate privileges or pivot to further attacks within the hosting environment.
Mitigation Recommendations
1. Immediately disable advanced mode in the Malcure plugin settings until a security patch is released. 2. Restrict user roles and permissions to the minimum necessary, avoiding granting Subscriber or higher privileges to untrusted users. 3. Monitor file system integrity and logs for suspicious file deletion activities, especially related to plugin directories and core WordPress files. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the wpmr_delete_file() function or related endpoints. 5. Regularly back up WordPress sites and databases to enable quick recovery in case of file deletion or compromise. 6. Stay updated with vendor advisories and apply patches promptly once available. 7. Consider isolating WordPress instances in containerized or sandboxed environments to limit the impact of potential exploitation. 8. Conduct periodic security audits focusing on plugin permissions and capabilities to detect similar authorization issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
Description
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-6043 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Malcure Malware Scanner plugin for WordPress, a popular toolset for malware removal. The vulnerability arises from the lack of a capability check in the wpmr_delete_file() function, which is responsible for deleting files. This missing authorization allows any authenticated user with at least Subscriber-level privileges to invoke this function and delete arbitrary files on the server. The deletion of arbitrary files can be leveraged to remove critical WordPress or server files, potentially enabling remote code execution (RCE) by attackers. The vulnerability is present in all plugin versions up to and including 16.8 and requires that the WordPress site has advanced mode enabled, which likely exposes additional functionality or endpoints. The CVSS v3.1 base score is 8.1, reflecting a high severity due to the ease of exploitation (low attack complexity), the requirement of only low privileges (PR:L), no user interaction, and the significant impact on integrity and availability. The vulnerability is network exploitable and does not affect confidentiality directly but can lead to severe consequences through integrity and availability compromise. No patches have been officially released at the time of publication, and no known exploits have been reported in the wild. The vulnerability was reserved and published by Wordfence in mid-2025.
Potential Impact
The vulnerability allows attackers with minimal privileges (Subscriber-level) to delete arbitrary files on the server, which can lead to remote code execution, site defacement, data loss, or complete site downtime. For organizations relying on WordPress with the Malcure plugin, this can result in significant operational disruption, reputational damage, and potential data breaches if attackers leverage the file deletion to implant backdoors or remove security-critical files. Since WordPress powers a large portion of websites globally, especially small to medium businesses and content-driven sites, the impact is widespread. The requirement for advanced mode to be enabled limits the attack surface somewhat but does not eliminate risk, especially in environments where advanced mode is enabled for enhanced scanning or management features. The vulnerability undermines the integrity and availability of affected sites, potentially allowing attackers to escalate privileges or pivot to further attacks within the hosting environment.
Mitigation Recommendations
1. Immediately disable advanced mode in the Malcure plugin settings until a security patch is released. 2. Restrict user roles and permissions to the minimum necessary, avoiding granting Subscriber or higher privileges to untrusted users. 3. Monitor file system integrity and logs for suspicious file deletion activities, especially related to plugin directories and core WordPress files. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the wpmr_delete_file() function or related endpoints. 5. Regularly back up WordPress sites and databases to enable quick recovery in case of file deletion or compromise. 6. Stay updated with vendor advisories and apply patches promptly once available. 7. Consider isolating WordPress instances in containerized or sandboxed environments to limit the impact of potential exploitation. 8. Conduct periodic security audits focusing on plugin permissions and capabilities to detect similar authorization issues.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-12T20:44:34.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68774ab7a83201eaacd43808
Added to database: 7/16/2025, 6:46:15 AM
Last enriched: 2/27/2026, 3:58:19 PM
Last updated: 3/25/2026, 4:15:54 AM
Views: 156
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.