CVE-2025-7821
BaseFortify
Publication date: 2025-08-23
Last updated on: 2025-08-25
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | wc_plus | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the WC Plus WordPress plugin allows unauthenticated attackers to modify site data by exploiting a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action. Specifically, attackers can update the site's favicon logo base without proper authorization.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing unauthorized users to change your website's favicon logo base, potentially leading to site defacement or misleading site appearance. Although it does not affect confidentiality or availability, it compromises the integrity of your site data.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include uninstalling or disabling the WC Plus plugin version 1.2.0 or earlier, as the plugin has been temporarily closed and removed from download availability pending a security review. Additionally, ensure your WordPress installation is up to date and monitor official channels for a patched version before re-enabling the plugin. [1]