Description
The SmartCrawl SEO checker, analyzer & optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_submodule() function in all versions up to, and including, 3.14.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's setttings.
Published: 2025-09-30
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Plugin Settings Modification
Action: Update
AI Analysis

Impact

The vulnerability allows an attacker to change SmartCrawl plugin settings without proper authorization. The flaw is in the update_submodule() function where a capability check is omitted, enabling any authenticated user with Subscriber role or higher to modify configuration values. This could lead to configuration changes that affect SEO functionality, potentially redirecting traffic, changing meta data, or disrupting the site’s search engine visibility, thereby compromising integrity and visibility of the website.

Affected Systems

This flaw exists in the SmartCrawl SEO checker, analyzer & optimizer WordPress plugin by WPMU DEV for all versions up to 3.14.3 inclusive. Users running any of those releases on their WordPress installations are impacted.

Risk and Exploitability

The CVSS score of 4.3 reflects a moderate impact with the attacker needing only authenticated access at the Subscriber level. EPSS indicates a very low exploitation probability (<1%), and the vulnerability is not listed in CISA’s KEV catalog. However, because the attacker only requires valid credentials and the flaw is straightforward to exploit via the plugin’s update endpoint, the risk remains non‑negligible for sites that permit many users with Subscriber or higher roles. Patch status is currently unknown, so the attack path is likely accessible via the plugin’s settings update interface.

Generated by OpenCVE AI on April 22, 2026 at 13:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SmartCrawl to version 3.15.0 or later
  • If an upgrade is not possible immediately, deactivate the plugin until a patch is available
  • Verify that any existing settings modifications have not altered SEO critical options and revert if necessary

Generated by OpenCVE AI on April 22, 2026 at 13:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31706 The SmartCrawl SEO checker, analyzer & optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_submodule() function in all versions up to, and including, 3.14.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's setttings.
History

Thu, 02 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpmudev
Wpmudev smartcrawl
Vendors & Products Wordpress
Wordpress wordpress
Wpmudev
Wpmudev smartcrawl

Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 05:45:00 +0000

Type Values Removed Values Added
Description The SmartCrawl SEO checker, analyzer & optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_submodule() function in all versions up to, and including, 3.14.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's setttings.
Title SmartCrawl SEO checker, analyzer & optimizer <= 3.14.3 - Missing Authorization to Plugin Settings Update
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpmudev Smartcrawl
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:39.836Z

Reserved: 2025-09-29T16:31:24.156Z

Link: CVE-2025-11163

cve-icon Vulnrichment

Updated: 2025-09-30T15:41:12.460Z

cve-icon NVD

Status : Deferred

Published: 2025-09-30T11:37:39.197

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:30:17Z

Weaknesses