The LWSCache plugin for WordPress is vulnerable to unauthorized modification of data due to improper authorization on the lwscache_activatePlugin() function in all versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate arbitrary whitelisted LWS plugins.
History

Mon, 01 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Aurelienlws
Aurelienlws lwscache
Wordpress
Wordpress wordpress
Vendors & Products Aurelienlws
Aurelienlws lwscache
Wordpress
Wordpress wordpress

Fri, 29 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 29 Aug 2025 04:30:00 +0000

Type Values Removed Values Added
Description The LWSCache plugin for WordPress is vulnerable to unauthorized modification of data due to improper authorization on the lwscache_activatePlugin() function in all versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate arbitrary whitelisted LWS plugins.
Title LWSCache <= 2.8.5 - Missing Authorization to Authenticated (Subscriber+) Limited Plugin Activation via lwscache_activatePlugin Function
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-08-29T04:25:28.386Z

Updated: 2025-08-29T12:03:54.361Z

Reserved: 2025-07-24T21:11:54.996Z

Link: CVE-2025-8147

cve-icon Vulnrichment

Updated: 2025-08-29T12:03:51.687Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-29T05:15:31.483

Modified: 2025-08-29T16:24:29.730

Link: CVE-2025-8147

cve-icon Redhat

No data.