Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7828: CWE-862 Missing Authorization in evigeo WP Filter & Combine RSS Feeds

0
Medium
VulnerabilityCVE-2025-7828cvecve-2025-7828cwe-862
Published: Sat Aug 23 2025 (08/23/2025, 04:25:48 UTC)
Source: CVE Database V5
Vendor/Project: evigeo
Product: WP Filter & Combine RSS Feeds

Description

The WP Filter & Combine RSS Feeds plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the post_listing_page() function in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete feeds.

AI-Powered Analysis

AILast updated: 08/31/2025, 01:10:13 UTC

Technical Analysis

CVE-2025-7828 is a medium-severity vulnerability affecting the WordPress plugin 'WP Filter & Combine RSS Feeds' developed by evigeo. The issue arises from a missing authorization check in the post_listing_page() function across all versions up to and including 0.4. Specifically, the plugin fails to verify whether the authenticated user has the appropriate capabilities before allowing modification actions. As a result, any authenticated user with Contributor-level privileges or higher can exploit this flaw to delete RSS feeds managed by the plugin. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly restrict access to sensitive functions. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily due to the limited scope of the attack (requiring authenticated access with at least Contributor privileges) and the impact being limited to integrity (deletion of feeds) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based (remote), with low attack complexity and no user interaction required beyond authentication. This vulnerability could be leveraged by malicious insiders or compromised Contributor accounts to disrupt content aggregation or feed management on affected WordPress sites.

Potential Impact

For European organizations using WordPress sites with the 'WP Filter & Combine RSS Feeds' plugin, this vulnerability could lead to unauthorized deletion of RSS feeds, potentially disrupting content delivery and aggregation workflows. While the impact does not extend to data confidentiality or site availability, the integrity compromise could affect news portals, media companies, or any organization relying on aggregated RSS feeds for timely information dissemination. This could result in reputational damage, loss of user trust, and operational inefficiencies. Organizations with multiple contributors or less stringent access controls are at higher risk, as attackers only need Contributor-level access. Given the widespread use of WordPress in Europe across various sectors, including SMEs, media, and public institutions, the vulnerability could have a moderate operational impact if exploited.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the 'WP Filter & Combine RSS Feeds' plugin, especially versions up to 0.4. Until an official patch is released, administrators should restrict Contributor-level access strictly to trusted users and consider temporarily disabling or uninstalling the plugin if it is not critical. Implementing role-based access control (RBAC) reviews and enforcing the principle of least privilege will reduce the attack surface. Monitoring WordPress logs for unusual feed deletion activities can help detect exploitation attempts early. Additionally, organizations should maintain regular backups of their WordPress content and plugin configurations to enable rapid restoration if feed data is deleted. Finally, stay alert for vendor updates or patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T19:12:48.298Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a9446fad5a09ad00269537

Added to database: 8/23/2025, 4:32:47 AM

Last enriched: 8/31/2025, 1:10:13 AM

Last updated: 10/16/2025, 9:11:18 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats