Description
The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on the 'sweet_energy_efficiency_action' AJAX handler in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with subscriber level access and above, to read, modify, and delete arbitrary graphs.
Published: 2025-12-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized graph deletion causing loss of graphical data and integrity
Action: Patch Now
AI Analysis

Impact

The Sweet Energy Efficiency WordPress plugin contains a flaw in the sweet_energy_efficiency_action AJAX handler. The plugin fails to perform a capability check, allowing any authenticated user with Subscriber role or higher to execute deletion operations on arbitrary graph data. As a result, attackers can read, modify, and delete graph entries, undermining the integrity of the plugin’s data store. This weakness is classified as CWE‑862, Missing Authorization.

Affected Systems

This weakness affects the Sweet Energy Efficiency plugin for WordPress, version 1.0.6 and all earlier releases. The plugin is distributed by wpdirectorykit. A site that hosts WordPress with this plugin up to 1.0.6 is therefore vulnerable; the plugin’s documentation and WordPress plugin repository show that the vulnerable AJAX action exists in those releases.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further implying limited public exploitation. Nevertheless, the flaw can be exploited by any authenticated user who has Subscriber or higher role, making the attack vector internal and reliant on existing account credentials. Once the flaw is abused, data loss or unauthorized modification of graph metadata can occur, directly affecting the integrity of dashboards and reporting.

Generated by OpenCVE AI on April 22, 2026 at 16:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sweet Energy Efficiency plugin to the latest certified version that includes the missing capability check.
  • If upgrading is not immediately possible, disable the plugin or the sweet_energy_efficiency_action AJAX endpoint to prevent deletion until a patch is available.
  • Alternatively, modify the role capabilities using a user role editor plugin to remove the ability of Subscriber level users to invoke graph deletion.

Generated by OpenCVE AI on April 22, 2026 at 16:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
Description The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on the 'sweet_energy_efficiency_action' AJAX handler in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with subscriber level access and above, to read, modify, and delete arbitrary graphs.
Title Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:40:28.444Z

Reserved: 2025-12-12T20:52:54.187Z

Link: CVE-2025-14618

cve-icon Vulnrichment

Updated: 2025-12-18T14:35:41.101Z

cve-icon NVD

Status : Deferred

Published: 2025-12-18T13:15:47.523

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:15:21Z

Weaknesses