Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62122: CWE-862 Missing Authorization in Solwininfotech Trash Duplicate and 301 Redirect

0
Medium
VulnerabilityCVE-2025-62122cvecve-2025-62122cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 15:38:08 UTC)
Source: CVE Database V5
Vendor/Project: Solwininfotech
Product: Trash Duplicate and 301 Redirect

Description

Missing Authorization vulnerability in Solwininfotech Trash Duplicate and 301 Redirect allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Trash Duplicate and 301 Redirect: from n/a through 1.9.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:28:06 UTC

Technical Analysis

CVE-2025-62122 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Solwininfotech Trash Duplicate and 301 Redirect plugin, which is used in WordPress environments to manage duplicate content and URL redirections. The vulnerability stems from improperly configured access control mechanisms that fail to verify whether a user is authorized to perform certain actions within the plugin. This flaw allows unauthenticated remote attackers to invoke plugin functions that should be restricted, potentially leading to denial-of-service conditions by disrupting normal plugin operations or causing resource exhaustion. The vulnerability affects all versions up to 1.9.1, though the exact affected versions are not fully enumerated. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, meaning the attack can be launched remotely without authentication or user interaction, and impacts only availability. No known public exploits or patches are currently available, increasing the urgency for organizations to implement compensating controls. The vulnerability does not compromise data confidentiality or integrity but can degrade service availability, potentially affecting website uptime and user experience. Given the plugin’s role in managing redirects and duplicate content, exploitation could also indirectly affect SEO and site reliability. The vulnerability was reserved in early October 2025 and published at the end of December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the primary impact of CVE-2025-62122 is the potential disruption of web services that rely on the Solwininfotech Trash Duplicate and 301 Redirect plugin. This can lead to denial-of-service conditions, causing website downtime or degraded performance, which in turn can affect customer trust, e-commerce transactions, and brand reputation. Although the vulnerability does not expose sensitive data or allow unauthorized data modification, availability issues can have significant operational and financial consequences, especially for businesses with high web traffic or critical online services. Additionally, improper redirect handling could impact SEO rankings, indirectly affecting business visibility and revenue. Organizations in sectors such as retail, media, and online services, which heavily depend on WordPress plugins for content management and SEO, are particularly at risk. The lack of authentication requirements for exploitation increases the attack surface, making automated scanning and exploitation attempts feasible. However, the absence of known exploits in the wild currently reduces immediate risk, though this may change if attackers develop weaponized tools.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls to mitigate CVE-2025-62122. These include restricting access to the plugin’s endpoints via web application firewalls (WAFs) or server-level access controls to allow only trusted IP addresses or authenticated users. Monitoring web server logs for unusual or repeated requests targeting the plugin’s functions can help detect exploitation attempts early. Organizations should also consider disabling or uninstalling the plugin if it is not essential to reduce the attack surface. For environments where the plugin is critical, isolating it within segmented network zones can limit potential impact. Regular backups and incident response plans should be updated to handle potential availability disruptions. Once patches become available from Solwininfotech, prompt testing and deployment are essential. Additionally, organizations should keep their WordPress core and other plugins up to date to minimize overall risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:41:34.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695544badb813ff03ef0a0a3

Added to database: 12/31/2025, 3:43:54 PM

Last enriched: 1/20/2026, 10:28:06 PM

Last updated: 2/7/2026, 4:36:39 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats