Description
The WP Wallcreeper plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_notices hook in all versions up to, and including, 1.6.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable and disable caching.
Published: 2025-07-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of plugin caching settings by authenticated subscribers and above
Action: Immediate Patch
AI Analysis

Impact

The WP Wallcreeper WordPress plugin contains a missing capability check on the admin_notices hook in all releases up to and including 1.6.1. This flaw, identified as CWE‑862 (Missing Authorization), permits any authenticated user with Subscriber-level access or higher to enable or disable the plugin's caching feature, thereby altering site behavior without proper authorization. The vulnerability does not expose remote code execution or direct data exfiltration but enables an attacker to tamper with site performance and potentially disrupt content delivery.

Affected Systems

WordPress installations that use the WP Wallcreeper plugin, versions 1.6.1 and all earlier releases. Any site that has the plugin activated and an authenticated user with Subscriber or higher privileges is at risk.

Risk and Exploitability

The CVSS score of 4.3 reflects a moderate impact for authorized users, while the EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. Exploitation requires only that the attacker is logged into the WordPress admin area; no additional vulnerabilities or elevated privileges are needed beyond the standard role permissions. The attack vector is the web application through the admin_notices hook, inferred from the description.

Generated by OpenCVE AI on April 22, 2026 at 04:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Wallcreeper to version 1.6.2 or later where the capability check is enforced
  • Audit the WordPress user roles to confirm that Subscriber accounts do not possess the capability to modify caching settings; adjust role definitions if necessary
  • Apply a role‑management plugin or configuration to restrict cache‑control capabilities exclusively to administrators or designated roles

Generated by OpenCVE AI on April 22, 2026 at 04:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22502 The WP Wallcreeper plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_notices hook in all versions up to, and including, 1.6.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable and disable caching.
History

Thu, 24 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 24 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The WP Wallcreeper plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_notices hook in all versions up to, and including, 1.6.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable and disable caching.
Title WP Wallcreeper <= 1.6.1 - Missing Authorization to Authenticated (Susbcriber+) Cache Enable/Disable
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:57:06.471Z

Reserved: 2025-07-18T17:42:40.994Z

Link: CVE-2025-7822

cve-icon Vulnrichment

Updated: 2025-07-24T13:35:38.266Z

cve-icon NVD

Status : Deferred

Published: 2025-07-24T10:15:28.763

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:15:07Z

Weaknesses