CVE-2025-10583
LOWCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Lifecycle Timeline
2Description
The WP Fastest Cache Premium plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.7.4 via the 'get_server_time_ajax_request' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The free version is not affected.
Analysis
WP Fastest Cache Premium plugin versions up to 1.7.4 contain a Server-Side Request Forgery (SSRF) vulnerability in the 'get_server_time_ajax_request' AJAX action that allows authenticated Subscriber-level users to send arbitrary web requests originating from the server, potentially enabling reconnaissance and manipulation of internal services. The free version is unaffected. No public exploit code has been identified at time of analysis, with a very low EPSS score of 0.04% indicating minimal real-world exploitation likelihood despite the authenticated attack vector.
Technical Context
The vulnerability stems from improper authorization controls on an AJAX endpoint (CWE-862: Missing Authorization), allowing authenticated users with Subscriber privileges or above to make requests through the 'get_server_time_ajax_request' action without adequate validation of the destination URL. This is a classic SSRF pattern where the WordPress application acts as a proxy for attacker-controlled requests, enabling access to internal network resources, metadata services (such as cloud provider IMDSv2 endpoints), or administrative interfaces normally isolated from external networks. The issue affects only the WP Fastest Cache Premium plugin (WordPress plugin ecosystem), with the flaw residing in AJAX handler code that fails to properly restrict request destinations or validate caller authorization scope.
Affected Products
WP Fastest Cache Premium plugin for WordPress in versions up to and including 1.7.4 is affected. The free version of WP Fastest Cache is not vulnerable. Affected users can identify their installation via the WordPress plugin management interface or by checking the plugin file version metadata. The vulnerability does not affect WordPress core, themes, or other plugins-only the Premium tier of this specific caching plugin.
Remediation
Update WP Fastest Cache Premium to version 1.7.5 or later via the WordPress plugin management dashboard or by downloading directly from the vendor. If automatic updates are not enabled, manually deactivate and delete the vulnerable plugin version, then download and install the patched version from wpfastestcache.com/changelog. As an interim workaround pending updates, site administrators may restrict Subscriber-level access or limit user registration to trusted accounts only; however, this does not address the underlying AJAX authorization flaw and is not a substitute for patching. Refer to the Wordfence vulnerability advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e64c54-a78f-454a-a9ee-02f64b6ae83d?source=cve) for additional context and the changelog at https://www.wpfastestcache.com/changelog/ to confirm patch availability.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today