CVE-2025-14608
Unknown Unknown - Not Provided
Insecure Direct Object Reference in WP Last Modified Info Plugin

Publication date: 2026-02-14

Last updated on: 2026-02-14

Assigner: Wordfence

Description
The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.5. This is due to the plugin not validating a user's access to a post before modifying its metadata in the 'bulk_save' AJAX action. This makes it possible for authenticated attackers, with Author-level access and above, to update the last modified metadata and lock the modification date of arbitrary posts, including those created by Administrators via the 'post_ids' parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-14
Last Modified
2026-02-14
Generated
2026-05-07
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordfence wp_last_modified_info to 1.9.5 (inc)
wordfence wp_last_modified_info 1.9.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The WP Last Modified Info plugin for WordPress has a vulnerability known as Insecure Direct Object Reference (IDOR) in all versions up to and including 1.9.5. This occurs because the plugin does not properly validate whether a user has permission to access a post before allowing modification of its metadata during the 'bulk_save' AJAX action.

As a result, authenticated users with Author-level access or higher can exploit this flaw to update the last modified metadata and lock the modification date of any arbitrary posts, including those created by Administrators, by manipulating the 'post_ids' parameter.


How can this vulnerability impact me? :

This vulnerability allows attackers with Author-level or higher access to modify the last modified date metadata of posts they do not own or have permission to edit. They can lock the modification date, preventing it from being updated automatically.

The impact includes potential misinformation about when content was last updated, which can affect content integrity and trustworthiness. It may also interfere with workflows or auditing processes that rely on accurate modification timestamps.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves unauthorized modification of post metadata via the 'bulk_save' AJAX action in the WP Last Modified Info plugin. Detection involves monitoring for suspicious bulk edit AJAX requests that modify the last modified metadata of posts without proper permission checks."}, {'type': 'paragraph', 'content': "Since the vulnerability allows authenticated users with Author-level access and above to update last modified metadata of arbitrary posts via the 'post_ids' parameter, detection can focus on monitoring AJAX requests to the 'process_bulk_edit' action that include unexpected or unauthorized post IDs."}, {'type': 'paragraph', 'content': 'Suggested commands or methods to detect exploitation attempts include:'}, {'type': 'list_item', 'content': "Inspect web server access logs for POST requests to admin-ajax.php with the action parameter set to 'process_bulk_edit'."}, {'type': 'list_item', 'content': "Use grep or similar tools to filter logs for 'action=process_bulk_edit' and analyze the 'post_ids' parameter for unusual or unauthorized post IDs."}, {'type': 'list_item', 'content': 'Example command to search Apache or Nginx logs for suspicious bulk edit AJAX calls:'}, {'type': 'list_item', 'content': "grep 'action=process_bulk_edit' /var/log/apache2/access.log | grep 'post_ids='"}, {'type': 'list_item', 'content': 'Monitor WordPress user activity logs (if available) for bulk edit operations on posts, especially those involving modification of last modified dates.'}, {'type': 'list_item', 'content': "Check the post meta fields '_wplmi_last_modified' and '_lmt_disableupdate' for unexpected changes or locked modification dates on posts that should not be altered."}] [1, 4]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the WP Last Modified Info plugin to version 1.9.6 or later, where the vulnerability has been fixed by adding proper permission checks during bulk edit operations.

Additional mitigation steps include:

  • Restrict bulk edit capabilities to trusted users only, ensuring that only users with appropriate permissions can perform bulk modifications.
  • Implement monitoring and alerting on bulk edit AJAX actions to detect unauthorized attempts.
  • Review and audit post meta fields related to last modified dates to identify and revert unauthorized changes.
  • Apply WordPress security best practices such as limiting plugin access, using strong authentication, and keeping all plugins and WordPress core updated.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart