CVE-2025-10583

LOW
2025-12-12 [email protected]
3.5
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 19:39 vuln.today
CVE Published
Dec 12, 2025 - 08:15 nvd
LOW 3.5

Description

The WP Fastest Cache Premium plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.7.4 via the 'get_server_time_ajax_request' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The free version is not affected.

Analysis

WP Fastest Cache Premium plugin versions up to 1.7.4 contain a Server-Side Request Forgery (SSRF) vulnerability in the 'get_server_time_ajax_request' AJAX action that allows authenticated Subscriber-level users to send arbitrary web requests originating from the server, potentially enabling reconnaissance and manipulation of internal services. The free version is unaffected. No public exploit code has been identified at time of analysis, with a very low EPSS score of 0.04% indicating minimal real-world exploitation likelihood despite the authenticated attack vector.

Technical Context

The vulnerability stems from improper authorization controls on an AJAX endpoint (CWE-862: Missing Authorization), allowing authenticated users with Subscriber privileges or above to make requests through the 'get_server_time_ajax_request' action without adequate validation of the destination URL. This is a classic SSRF pattern where the WordPress application acts as a proxy for attacker-controlled requests, enabling access to internal network resources, metadata services (such as cloud provider IMDSv2 endpoints), or administrative interfaces normally isolated from external networks. The issue affects only the WP Fastest Cache Premium plugin (WordPress plugin ecosystem), with the flaw residing in AJAX handler code that fails to properly restrict request destinations or validate caller authorization scope.

Affected Products

WP Fastest Cache Premium plugin for WordPress in versions up to and including 1.7.4 is affected. The free version of WP Fastest Cache is not vulnerable. Affected users can identify their installation via the WordPress plugin management interface or by checking the plugin file version metadata. The vulnerability does not affect WordPress core, themes, or other plugins-only the Premium tier of this specific caching plugin.

Remediation

Update WP Fastest Cache Premium to version 1.7.5 or later via the WordPress plugin management dashboard or by downloading directly from the vendor. If automatic updates are not enabled, manually deactivate and delete the vulnerable plugin version, then download and install the patched version from wpfastestcache.com/changelog. As an interim workaround pending updates, site administrators may restrict Subscriber-level access or limit user registration to trusted accounts only; however, this does not address the underlying AJAX authorization flaw and is not a substitute for patching. Refer to the Wordfence vulnerability advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e64c54-a78f-454a-a9ee-02f64b6ae83d?source=cve) for additional context and the changelog at https://www.wpfastestcache.com/changelog/ to confirm patch availability.

Priority Score

18
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +18
POC: 0

Share

CVE-2025-10583 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy