VYPR
Medium severity4.3NVD Advisory· Published Jan 9, 2026· Updated Apr 15, 2026

CVE-2025-13749

CVE-2025-13749

Description

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.0. This is due to missing nonce validation on the "wbcr_upm_change_flag" function. This makes it possible for unauthenticated attackers to disable plugin/theme update notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Clearfy Cache <=2.4.0 has a CSRF in the Updates Manager that lets attackers silently disable update notifications, hiding available patches from admins.

Vulnerability

Overview

The Clearfy Cache plugin for WordPress (versions up to and including 2.4.0) contains a Cross-Site Request Forgery (CSRF) vulnerability in the wbcr_upm_change_flag AJAX handler. The function lacks nonce validation (check_ajax_referer is missing), allowing an attacker to forge requests that modify update-related settings without the administrator's consent [1].

Exploitation

Details

An unauthenticated attacker can craft a malicious link or page that, when clicked by a logged-in administrator, triggers a state-changing request to the vulnerable endpoint. Although the handler performs a capability check for install_plugins, this does not prevent CSRF because the request can be made from an external site while the admin's session is active [1]. The attack requires social engineering to trick the admin into clicking the link.

Impact

Successful exploitation silently disables update notifications for specific plugins or themes. The targeted item disappears from the update list and the familiar yellow update banner is no longer shown, giving the administrator any visible indication that updates are pending. This stealthy behavior can keep vulnerable software in place, increasing the risk of compromise over time as security patches are effectively hidden [1].

Mitigation

The vendor has not released a patched version as of the publication date. Users should consider applying a virtual patch via a Web Application Firewall (WAF) or manually adding nonce validation to the affected function. The vulnerability is publicly disclosed with a proof of concept, but no active exploitation has been reported [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.