CVE-2025-6059 β€” Cross-Site Request Forgery in Seraphinite Accelerator

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 87.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14

Description

The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages1 packages

πŸ”΄Vulnerability Details

2
CVEList
Seraphinite Accelerator <= 2.27.21 - Cross-Site Request Forgery to Multiple Administrative Actions↗2025-06-14
β–Ά
GHSA
GHSA-45r7-9fh5-3vpw: The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2β†—2025-06-14
β–Ά
CVE-2025-6059 β€” Cross-Site Request Forgery | cvebase