CVE-2025-6213
Description
The Nginx Cache Purge Preload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.1 via the 'nppp_preload_cache_on_update' function. This is due to insufficient sanitization of the $_SERVER['HTTP_REFERERER'] parameter passed from the 'nppp_handle_fastcgi_cache_actions_admin_bar' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Nginx Cache Purge Preload plugin ≤2.1.1 for WordPress has an authenticated Remote Code Execution flaw via unsanitized HTTP_REFERERER server variable in the admin bar handler.
Vulnerability
Description The Nginx Cache Purge Preload plugin (NPP) for WordPress, in all versions up to and including 2.1.1, contains a Remote Code Execution vulnerability. The root cause lies in insufficient sanitization of the $_SERVER['HTTP_REFERERER'] server variable passed from the nppp_handle_fastcgi_cache_actions_admin_bar function to the nppp_preload_cache_on_update function. This unsanitized input can be processed by the plugin in a way that leads to arbitrary code execution on the server [1][2].
Exploitation and
Attack Surface To exploit this vulnerability, an attacker must be authenticated with Administrator-level access or higher. No special network position is required beyond being able to send a crafted HTTP request to the WordPress admin interface. The plugin’s reliance on PHP’s shell_exec() function and direct execution of system utilities creates a dangerous attack surface when user-controlled input is not properly filtered [2]. The vulnerable $_SERVER['HTTP_REFERERER'] can be manipulated by an attacker to inject commands that are then executed by the server.
Impact
A successful exploit allows an authenticated administrator to execute arbitrary operating system commands on the underlying server. This could result in full compromise of the WordPress instance, data exfiltration, lateral movement within the hosting environment, or installation of backdoors. Given that the attacker already has administrative access to WordPress, this vulnerability elevates the threat from web-application administrative control to server-level control [1].
Mitigation
Status The vendor has released an updated version of the plugin to address this issue. Users are strongly advised to update to version 2.1.2 or later, which contains the necessary input sanitization fixes. As of the publication date, there is no evidence of this CVE being listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, but administrative credential exposure or weak passwords could make exploitation more likely [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.