Skip to main content

CVE-2025-7772: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for Malware Removal

Medium
VulnerabilityCVE-2025-7772cvecve-2025-7772cwe-862
Published: Fri Jul 18 2025 (07/18/2025, 06:45:32 UTC)
Source: CVE Database V5
Vendor/Project: malcure
Product: Malcure Malware Scanner — #1 Toolset for Malware Removal

Description

The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 16.8 via the wpmr_inspect_file() function due to a missing capability check. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

AILast updated: 07/18/2025, 07:16:24 UTC

Technical Analysis

CVE-2025-7772 is a vulnerability identified in the Malcure Malware Scanner plugin for WordPress, a widely used toolset for malware removal. The vulnerability is classified as CWE-862, indicating a missing authorization check. Specifically, the issue exists in the wpmr_inspect_file() function, which lacks proper capability verification before allowing file inspection. This flaw enables authenticated attackers with subscriber-level privileges or higher to perform arbitrary file reads on the server hosting the WordPress site. Since subscriber-level access is relatively low privilege, this significantly lowers the barrier for exploitation. The attacker can read sensitive files on the server, potentially exposing credentials, configuration files, or other confidential data. The vulnerability affects all versions up to and including 16.8 of the plugin. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts confidentiality but not integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability’s presence in a popular WordPress plugin increases the risk surface, given WordPress’s extensive deployment across many European organizations. The missing authorization check is a critical security oversight that can lead to data leakage and potential further compromise if sensitive information is harvested by attackers.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive data hosted on WordPress sites using the Malcure Malware Scanner plugin. Many European businesses, government agencies, and non-profits rely on WordPress for their web presence, and the plugin’s popularity means a broad attack surface. Unauthorized file reads could expose private keys, database credentials, or personal data protected under GDPR, leading to regulatory penalties and reputational damage. Attackers could leverage harvested information to escalate privileges or move laterally within networks. The vulnerability’s exploitation does not affect system integrity or availability directly, but the confidentiality breach alone can have severe consequences, especially for sectors handling sensitive personal or financial information. Additionally, the medium severity score suggests that while the risk is not critical, it is substantial enough to warrant immediate attention to prevent data breaches. The lack of user interaction and the low privilege requirement make it easier for attackers to exploit once they have subscriber access, which can be obtained through phishing or weak credential reuse.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Immediately audit WordPress installations to identify the presence and version of the Malcure Malware Scanner plugin. 2) Restrict subscriber-level access strictly, ensuring that only trusted users have such accounts, and enforce strong authentication policies including multi-factor authentication to reduce account compromise risk. 3) Monitor web server logs for unusual file access patterns that may indicate exploitation attempts targeting the wpmr_inspect_file() function. 4) Until an official patch is released, consider disabling or removing the Malcure plugin if feasible, or apply temporary access controls at the web server or application firewall level to restrict access to the vulnerable functionality. 5) Implement file system permissions and web server configurations that limit the plugin’s ability to read sensitive files outside its intended scope. 6) Regularly update WordPress core and all plugins to the latest versions to benefit from security fixes. 7) Conduct internal security awareness training to reduce the risk of subscriber account compromise. 8) Prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-17T17:27:25.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6879f137a83201eaacf06700

Added to database: 7/18/2025, 7:01:11 AM

Last enriched: 7/18/2025, 7:16:24 AM

Last updated: 7/18/2025, 7:16:24 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats