VYPR
Medium severity4.3NVD Advisory· Published Nov 27, 2025· Updated Apr 15, 2026

CVE-2025-10476

CVE-2025-10476

Description

The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpfc_db_fix_callback() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to initiate several database fix actions. This only affects sites with premium activated.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The WP Fastest Cache plugin <=1.4.0 lacks authorization checks, allowing authenticated users with Subscriber-level access to trigger destructive database cleanup actions.

Vulnerability

Details

The WP Fastest Cache plugin for WordPress fails to perform a capability check in the wpfc_db_fix_callback() AJAX function. This oversight allows authenticated users with at least Subscriber-level access to initiate several database fix actions without proper authorization [1].

Exploitation

An attacker logged into WordPress with Subscriber privileges can trigger this vulnerability by sending a crafted request to the vulnerable AJAX endpoint. The type parameter specifies which cleanup operation to perform, such as deleting content revisions, trashed items, spam comments, or transient data [1]. No additional privileges are required beyond the default Subscriber role.

Impact

Successful exploitation results in unauthorized modification of database data, leading to loss of content history, removal of legitimate comments, and potential disruption of site functionality. This can degrade site integrity and availability, requiring administrative intervention to restore normal operations [1].

Mitigation

The vulnerability affects all versions up to and including 1.4.0. Users are advised to update to the latest patched version as soon as possible. According to the advisory, the issue only impacts sites with the premium version activated [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.