Description
The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-06-14
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery allowing unauthenticated users to trigger administrative actions such as cache deletion.
Action: Patch
AI Analysis

Impact

The vulnerability is a missing or incorrect nonce check in the OnAdminApi_CacheOpBegin function, enabling a CSRF attack that lets unauthenticated users cause a logged‑in administrator to perform privileged actions like clearing the cache. This can disrupt site performance or logging without granting direct access to content.

Affected Systems

The affected product is the WordPress plugin Seraphinite Accelerator up to and including version 2.27.21, provided by Seraphinite Software. No other versions are mentioned.

Risk and Exploitability

CVSS score 4.3 indicates low severity. EPSS <1% shows a very low probability of exploitation. The flaw is not listed in CISA KEV, suggesting no known widespread exploitation yet. The attack requires a victim administrator to click a crafted link after the attacker lures them; thus it relies on social engineering, and no remote code execution or direct authentication is needed.

Generated by OpenCVE AI on April 20, 2026 at 22:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Seraphinite Accelerator to version 2.27.22 or later, which includes proper nonce validation for the affected function.
  • If immediate upgrade is not possible, remove or disable the OnAdminApi_CacheOpBegin endpoint until a patch can be applied, or restrict access to that action to users with the Administrator role.
  • Employ a web application firewall or security plugin that blocks CSRF attempts by validating nonces on administrative endpoints.

Generated by OpenCVE AI on April 20, 2026 at 22:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18319 The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}

epss

{'score': 0.00014}


Sat, 14 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Seraphinite Accelerator <= 2.27.21 - Cross-Site Request Forgery to Multiple Administrative Actions
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:42.480Z

Reserved: 2025-06-13T13:08:58.727Z

Link: CVE-2025-6059

cve-icon Vulnrichment

Updated: 2025-06-16T16:47:20.867Z

cve-icon NVD

Status : Deferred

Published: 2025-06-14T03:15:22.283

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses