CVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
AI Analysis
Technical Summary
CVE-2025-6043 is a high-severity vulnerability affecting the Malcure Malware Scanner plugin for WordPress, a widely used toolset for malware removal. The vulnerability arises from a missing authorization check (CWE-862) in the wpmr_delete_file() function, which is responsible for deleting files. Specifically, the plugin fails to verify whether the user has the necessary capabilities before allowing file deletion. This flaw allows any authenticated user with Subscriber-level access or higher to delete arbitrary files on the server. The exploitability of this vulnerability is conditional on the WordPress site having the plugin's advanced mode enabled, which exposes the vulnerable functionality. Successful exploitation can lead to arbitrary file deletion, which in turn can enable remote code execution (RCE) by removing or modifying critical files, potentially allowing attackers to execute malicious code remotely. The vulnerability affects all versions of the plugin up to and including version 16.8. The CVSS v3.1 base score is 8.1, reflecting a high severity due to the network attack vector, low attack complexity, and the requirement of low privileges (authenticated user) but no user interaction. The impact on integrity and availability is high, while confidentiality impact is none. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin with advanced mode enabled.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress for their web presence and using the Malcure Malware Scanner plugin. Exploitation could lead to unauthorized deletion of critical files, resulting in website downtime, data loss, and potential defacement. More critically, the ability to achieve remote code execution could allow attackers to deploy backdoors, steal sensitive data, or pivot within the network, compromising broader IT infrastructure. This is particularly concerning for sectors with strict data protection regulations such as GDPR, where data integrity and availability are paramount. The disruption of public-facing websites could damage organizational reputation and lead to financial losses. Additionally, attackers could leverage compromised sites as part of larger botnets or for phishing campaigns, amplifying the threat landscape. The requirement for only Subscriber-level access lowers the barrier for exploitation, as such accounts are common in multi-user WordPress environments, increasing the risk profile for European enterprises and institutions using this plugin.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the Malcure Malware Scanner plugin and verify if advanced mode is enabled. If so, disable advanced mode until a patch or update is available. Since no patch links are currently provided, organizations should monitor the vendor’s official channels for updates and apply them promptly once released. In the interim, restrict user roles and permissions rigorously, ensuring that only trusted users have Subscriber-level or higher access. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the wpmr_delete_file() function or related endpoints. Conduct regular file integrity monitoring to detect unauthorized file deletions or modifications. Additionally, consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise. Employ multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise. Finally, maintain regular backups of website files and databases to enable rapid recovery from any destructive attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
Description
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-6043 is a high-severity vulnerability affecting the Malcure Malware Scanner plugin for WordPress, a widely used toolset for malware removal. The vulnerability arises from a missing authorization check (CWE-862) in the wpmr_delete_file() function, which is responsible for deleting files. Specifically, the plugin fails to verify whether the user has the necessary capabilities before allowing file deletion. This flaw allows any authenticated user with Subscriber-level access or higher to delete arbitrary files on the server. The exploitability of this vulnerability is conditional on the WordPress site having the plugin's advanced mode enabled, which exposes the vulnerable functionality. Successful exploitation can lead to arbitrary file deletion, which in turn can enable remote code execution (RCE) by removing or modifying critical files, potentially allowing attackers to execute malicious code remotely. The vulnerability affects all versions of the plugin up to and including version 16.8. The CVSS v3.1 base score is 8.1, reflecting a high severity due to the network attack vector, low attack complexity, and the requirement of low privileges (authenticated user) but no user interaction. The impact on integrity and availability is high, while confidentiality impact is none. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin with advanced mode enabled.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress for their web presence and using the Malcure Malware Scanner plugin. Exploitation could lead to unauthorized deletion of critical files, resulting in website downtime, data loss, and potential defacement. More critically, the ability to achieve remote code execution could allow attackers to deploy backdoors, steal sensitive data, or pivot within the network, compromising broader IT infrastructure. This is particularly concerning for sectors with strict data protection regulations such as GDPR, where data integrity and availability are paramount. The disruption of public-facing websites could damage organizational reputation and lead to financial losses. Additionally, attackers could leverage compromised sites as part of larger botnets or for phishing campaigns, amplifying the threat landscape. The requirement for only Subscriber-level access lowers the barrier for exploitation, as such accounts are common in multi-user WordPress environments, increasing the risk profile for European enterprises and institutions using this plugin.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the Malcure Malware Scanner plugin and verify if advanced mode is enabled. If so, disable advanced mode until a patch or update is available. Since no patch links are currently provided, organizations should monitor the vendor’s official channels for updates and apply them promptly once released. In the interim, restrict user roles and permissions rigorously, ensuring that only trusted users have Subscriber-level or higher access. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the wpmr_delete_file() function or related endpoints. Conduct regular file integrity monitoring to detect unauthorized file deletions or modifications. Additionally, consider isolating WordPress instances in segmented network zones to limit lateral movement in case of compromise. Employ multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise. Finally, maintain regular backups of website files and databases to enable rapid recovery from any destructive attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-12T20:44:34.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68774ab7a83201eaacd43808
Added to database: 7/16/2025, 6:46:15 AM
Last enriched: 7/16/2025, 7:01:33 AM
Last updated: 7/16/2025, 9:38:55 AM
Views: 5
Related Threats
CVE-2025-53758: CWE-312: Cleartext Storage of Sensitive Information in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
MediumCVE-2025-53757: CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in Digisol XPON ONU Wi-Fi Router (DG-GR6821AC)
HighCVE-2025-52836: CWE-266 Incorrect Privilege Assignment in Unity Business Technology Pty Ltd The E-Commerce ERP
CriticalCVE-2025-52819: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in pakkemx Pakke Envíos
HighCVE-2025-52804: CWE-862 Missing Authorization in uxper Nuss
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.