Description
The Felan Framework plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_plugin_actions' function called via an AJAX action in versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to activate or deactivate arbitrary plugins.
Published: 2025-10-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized plugin activation/deactivation
Action: Patch
AI Analysis

Impact

The Felan Framework WordPress theme contains a missing capability check in the AJAX handler 'process_plugin_actions'. Any visitor, regardless of authentication status, can call this endpoint and instruct the site to activate or deactivate installed plugins. Because this action does not enforce the appropriate permission, it allows an attacker to alter plugin states. Based on the description, it is inferred that an attacker could activate a malicious plugin or disable security‑related plugins, potentially compromising integrity or availability.

Affected Systems

All installations of the Felan Framework theme supplied by RiceTheme up to and including version 1.1.4 are vulnerable. The flaw is confined to the process_plugin_actions function used by the theme’s WordPress AJAX endpoint.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is below 1% and the vulnerability is not listed in CISA KEV, suggesting a low current exploitation probability. The attack vector is unauthenticated and remote, requiring only a crafted AJAX request. Successful exploitation gives the attacker the ability to alter plugin states; based on the vulnerability, this could enable execution of arbitrary code if a malicious plugin is activated, but the description does not explicitly confirm this outcome.

Generated by OpenCVE AI on April 22, 2026 at 00:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Felan Framework to a version that implements a capability check for the process_plugin_actions function (consult RiceTheme release notes for the fix).
  • If an upgrade is not immediately possible, restrict the AJAX endpoint by enforcing administrator capability checks, adding a nonce verification, or limiting access to the endpoint via a firewall rule that allows only trusted IPs.
  • Conduct a thorough audit of all active plugins to identify any that were activated or deactivated by unauthorized actors, disable suspicious plugins, and restore the intended configuration.

Generated by OpenCVE AI on April 22, 2026 at 00:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 16 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Felan Framework plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_plugin_actions' function called via an AJAX action in versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to activate or deactivate arbitrary plugins.
Title Felan Framework <= 1.1.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation/Deactivation via process_plugin_actions
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:57.034Z

Reserved: 2025-09-22T06:26:51.143Z

Link: CVE-2025-10849

cve-icon Vulnrichment

Updated: 2025-10-16T13:31:58.630Z

cve-icon NVD

Status : Deferred

Published: 2025-10-16T07:15:32.710

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10849

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses