The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Sat, 20 Dec 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP DB Booster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing nonce validation on the cleanup_all AJAX action. This makes it possible for unauthenticated attackers to delete database records including post drafts, revisions, comments, and metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | WP DB Booster <= 1.0.1 - Cross-Site Request Forgery to Database Cleanup | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-20T03:20:24.069Z
Reserved: 2025-12-05T21:24:56.492Z
Link: CVE-2025-14168
No data.
Status : Received
Published: 2025-12-20T04:16:07.840
Modified: 2025-12-20T04:16:07.840
Link: CVE-2025-14168
No data.
OpenCVE Enrichment
No data.