CVE-2025-7828: CWE-862 Missing Authorization in evigeo WP Filter & Combine RSS Feeds
The WP Filter & Combine RSS Feeds plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the post_listing_page() function in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete feeds.
AI Analysis
Technical Summary
CVE-2025-7828 is a security vulnerability identified in the WP Filter & Combine RSS Feeds plugin for WordPress, developed by evigeo. The vulnerability stems from a missing authorization check in the post_listing_page() function, which is responsible for managing feed data. This flaw affects all versions of the plugin up to and including version 0.4. Due to the absence of proper capability verification, authenticated users with Contributor-level privileges or higher can exploit this vulnerability to delete RSS feeds managed by the plugin. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access controls before allowing sensitive operations. The CVSS v3.1 base score is 4.3, reflecting a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of a Contributor or above, but does not require user interaction. The impact is limited to integrity, as attackers can delete feeds but cannot affect confidentiality or availability directly. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was publicly disclosed on August 23, 2025.
Potential Impact
For European organizations using WordPress websites with the WP Filter & Combine RSS Feeds plugin installed, this vulnerability poses a risk to the integrity of their RSS feed data. Attackers with Contributor-level access—which is a relatively low privilege level often granted to content creators or editors—could delete RSS feeds, potentially disrupting content syndication and automated content distribution channels. This could lead to loss of trust from users relying on these feeds, interruption of marketing or news dissemination, and additional operational overhead to restore deleted content. While the vulnerability does not directly compromise confidentiality or availability, the unauthorized deletion of feeds can degrade the integrity of published information and harm the organization's online presence. Since WordPress is widely used across Europe, especially by small and medium enterprises and media organizations, the impact could be significant if exploited in targeted attacks. The absence of known exploits reduces immediate risk, but the ease of exploitation and low privilege requirement mean that insider threats or compromised contributor accounts could be leveraged effectively.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP Filter & Combine RSS Feeds plugin. If detected, restrict Contributor-level privileges to trusted users only until a patch is available. Implement strict user role management and monitor contributor activities for unusual feed deletions. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the post_listing_page() function or feed deletion endpoints. Regularly back up RSS feed configurations and content to enable rapid restoration in case of unauthorized deletions. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Additionally, consider isolating or disabling the plugin if it is not critical to operations to eliminate the attack surface. Finally, enhance logging and alerting on feed management actions to detect potential exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7828: CWE-862 Missing Authorization in evigeo WP Filter & Combine RSS Feeds
Description
The WP Filter & Combine RSS Feeds plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the post_listing_page() function in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete feeds.
AI-Powered Analysis
Technical Analysis
CVE-2025-7828 is a security vulnerability identified in the WP Filter & Combine RSS Feeds plugin for WordPress, developed by evigeo. The vulnerability stems from a missing authorization check in the post_listing_page() function, which is responsible for managing feed data. This flaw affects all versions of the plugin up to and including version 0.4. Due to the absence of proper capability verification, authenticated users with Contributor-level privileges or higher can exploit this vulnerability to delete RSS feeds managed by the plugin. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access controls before allowing sensitive operations. The CVSS v3.1 base score is 4.3, reflecting a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of a Contributor or above, but does not require user interaction. The impact is limited to integrity, as attackers can delete feeds but cannot affect confidentiality or availability directly. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was publicly disclosed on August 23, 2025.
Potential Impact
For European organizations using WordPress websites with the WP Filter & Combine RSS Feeds plugin installed, this vulnerability poses a risk to the integrity of their RSS feed data. Attackers with Contributor-level access—which is a relatively low privilege level often granted to content creators or editors—could delete RSS feeds, potentially disrupting content syndication and automated content distribution channels. This could lead to loss of trust from users relying on these feeds, interruption of marketing or news dissemination, and additional operational overhead to restore deleted content. While the vulnerability does not directly compromise confidentiality or availability, the unauthorized deletion of feeds can degrade the integrity of published information and harm the organization's online presence. Since WordPress is widely used across Europe, especially by small and medium enterprises and media organizations, the impact could be significant if exploited in targeted attacks. The absence of known exploits reduces immediate risk, but the ease of exploitation and low privilege requirement mean that insider threats or compromised contributor accounts could be leveraged effectively.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP Filter & Combine RSS Feeds plugin. If detected, restrict Contributor-level privileges to trusted users only until a patch is available. Implement strict user role management and monitor contributor activities for unusual feed deletions. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the post_listing_page() function or feed deletion endpoints. Regularly back up RSS feed configurations and content to enable rapid restoration in case of unauthorized deletions. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Additionally, consider isolating or disabling the plugin if it is not critical to operations to eliminate the attack surface. Finally, enhance logging and alerting on feed management actions to detect potential exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T19:12:48.298Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a9446fad5a09ad00269537
Added to database: 8/23/2025, 4:32:47 AM
Last enriched: 8/23/2025, 4:49:33 AM
Last updated: 8/25/2025, 5:17:39 PM
Views: 18
Related Threats
CVE-2025-9429: Cross Site Scripting in mtons mblog
MediumCVE-2025-9426: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9425: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9424: OS Command Injection in Ruijie WS7204-A
MediumCVE-2025-9423: SQL Injection in Campcodes Online Water Billing System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.