CVE-2025-7828: CWE-862 Missing Authorization in evigeo WP Filter & Combine RSS Feeds
The WP Filter & Combine RSS Feeds plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the post_listing_page() function in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete feeds.
AI Analysis
Technical Summary
CVE-2025-7828 is a medium-severity vulnerability affecting the WordPress plugin 'WP Filter & Combine RSS Feeds' developed by evigeo. The issue arises from a missing authorization check in the post_listing_page() function across all versions up to and including 0.4. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing modification actions. As a result, any authenticated user with Contributor-level privileges or higher can exploit this flaw to delete RSS feeds managed by the plugin. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly restrict access to sensitive functions. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily due to the limited scope of the attack (requiring authenticated access with at least Contributor privileges) and the impact being limited to integrity (deletion of feeds) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based (remote), with low attack complexity and no user interaction required beyond authentication. This vulnerability could be leveraged by malicious insiders or compromised Contributor accounts to disrupt content aggregation or feed management on affected WordPress sites.
Potential Impact
For European organizations using WordPress sites with the 'WP Filter & Combine RSS Feeds' plugin, this vulnerability could lead to unauthorized deletion of RSS feeds, potentially disrupting content delivery and aggregation workflows. While the impact does not extend to data confidentiality or site availability, the integrity compromise could affect news portals, media companies, or any organization relying on aggregated RSS feeds for timely information dissemination. This could result in reputational damage, loss of user trust, and operational inefficiencies. Organizations with multiple contributors or less stringent access controls are at higher risk, as attackers only need Contributor-level access. Given the widespread use of WordPress in Europe across various sectors, including SMEs, media, and public institutions, the vulnerability could have a moderate operational impact if exploited.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'WP Filter & Combine RSS Feeds' plugin, especially versions up to 0.4. Until an official patch is released, administrators should restrict Contributor-level access strictly to trusted users and consider temporarily disabling or uninstalling the plugin if it is not critical. Implementing role-based access control (RBAC) reviews and enforcing the principle of least privilege will reduce the attack surface. Monitoring WordPress logs for unusual feed deletion activities can help detect exploitation attempts early. Additionally, organizations should maintain regular backups of their WordPress content and plugin configurations to enable rapid restoration if feed data is deleted. Finally, stay alert for vendor updates or patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7828: CWE-862 Missing Authorization in evigeo WP Filter & Combine RSS Feeds
Description
The WP Filter & Combine RSS Feeds plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the post_listing_page() function in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete feeds.
AI-Powered Analysis
Technical Analysis
CVE-2025-7828 is a medium-severity vulnerability affecting the WordPress plugin 'WP Filter & Combine RSS Feeds' developed by evigeo. The issue arises from a missing authorization check in the post_listing_page() function across all versions up to and including 0.4. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing modification actions. As a result, any authenticated user with Contributor-level privileges or higher can exploit this flaw to delete RSS feeds managed by the plugin. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly restrict access to sensitive functions. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily due to the limited scope of the attack (requiring authenticated access with at least Contributor privileges) and the impact being limited to integrity (deletion of feeds) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based (remote), with low attack complexity and no user interaction required beyond authentication. This vulnerability could be leveraged by malicious insiders or compromised Contributor accounts to disrupt content aggregation or feed management on affected WordPress sites.
Potential Impact
For European organizations using WordPress sites with the 'WP Filter & Combine RSS Feeds' plugin, this vulnerability could lead to unauthorized deletion of RSS feeds, potentially disrupting content delivery and aggregation workflows. While the impact does not extend to data confidentiality or site availability, the integrity compromise could affect news portals, media companies, or any organization relying on aggregated RSS feeds for timely information dissemination. This could result in reputational damage, loss of user trust, and operational inefficiencies. Organizations with multiple contributors or less stringent access controls are at higher risk, as attackers only need Contributor-level access. Given the widespread use of WordPress in Europe across various sectors, including SMEs, media, and public institutions, the vulnerability could have a moderate operational impact if exploited.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'WP Filter & Combine RSS Feeds' plugin, especially versions up to 0.4. Until an official patch is released, administrators should restrict Contributor-level access strictly to trusted users and consider temporarily disabling or uninstalling the plugin if it is not critical. Implementing role-based access control (RBAC) reviews and enforcing the principle of least privilege will reduce the attack surface. Monitoring WordPress logs for unusual feed deletion activities can help detect exploitation attempts early. Additionally, organizations should maintain regular backups of their WordPress content and plugin configurations to enable rapid restoration if feed data is deleted. Finally, stay alert for vendor updates or patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T19:12:48.298Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a9446fad5a09ad00269537
Added to database: 8/23/2025, 4:32:47 AM
Last enriched: 8/31/2025, 1:10:13 AM
Last updated: 10/16/2025, 9:11:18 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumCVE-2025-60358: n/a
MediumCVE-2025-61539: n/a
MediumCVE-2025-60855: n/a
MediumCVE-2025-61554: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.