CVE-2025-6213

The Nginx Cache Purge Preload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.1 via the 'nppp_preload_cache_on_update' function. This is due to insufficient sanitization of the $_SERVER['HTTP_REFERERER'] parameter passed from the 'nppp_handle_fastcgi_cache_actions_admin_bar' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Configurations

No configuration.

History

01 Aug 2025, 19:15

Type Values Removed Values Added
References
  • () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3332176%40fastcgi-cache-purge-and-preload-nginx&new=3332176%40fastcgi-cache-purge-and-preload-nginx&sfp_email=&sfph_mail=#file15 -
Summary
  • (es) El complemento Nginx Cache Purge Preload para WordPress es vulnerable a la ejecución remota de código en todas las versiones hasta la 2.1.1 incluida, a través de la función 'nppp_preload_cache_on_update'. Esto se debe a una depuración insuficiente del parámetro $_SERVER['HTTP_REFERER'] transferido desde la función 'nppp_handle_fastcgi_cache_actions_admin_bar'. Esto permite que atacantes autenticados, con acceso de administrador o superior, ejecuten código en el servidor.

22 Jul 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 10:15

Updated : 2025-08-01 19:15


NVD link : CVE-2025-6213

Mitre link : CVE-2025-6213

CVE.ORG link : CVE-2025-6213


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')