CVE-2025-6213
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2025-08-01

Assigner: Wordfence

Description
The Nginx Cache Purge Preload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.1 via the 'nppp_preload_cache_on_update' function. This is due to insufficient sanitization of the $_SERVER['HTTP_REFERERER'] parameter passed from the 'nppp_handle_fastcgi_cache_actions_admin_bar' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2025-08-01
Generated
2026-05-07
AI Q&A
2025-07-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress nginx_cache_purge_preload *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Nginx Cache Purge Preload plugin for WordPress (up to version 2.1.1). It allows authenticated users with Administrator-level access or higher to execute remote code on the server. The issue arises because the plugin does not properly sanitize the HTTP_REFERERER parameter in the nppp_preload_cache_on_update function, which is used by the nppp_handle_fastcgi_cache_actions_admin_bar function. This insufficient sanitization enables attackers to inject and execute malicious code.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with Administrator-level access to execute arbitrary code on the server hosting the WordPress site. This can lead to full compromise of the server, including data theft, data loss, service disruption, or further attacks within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart