CVE-2025-6213
WordPress · WordPress Nginx Cache Purge Preload plugin
A high-severity vulnerability has been identified in the Nginx Cache Purge Preload plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the Nginx Cache Purge Preload plugin for WordPress. This flaw allows a remote attacker to execute arbitrary code on the server, potentially leading to a complete compromise of the affected website. Successful exploitation could result in data theft, website defacement, or the use of the server for further malicious activities.
Vulnerability
The Nginx Cache Purge Preload plugin is vulnerable to Remote Code Execution (RCE). An attacker could exploit this by sending a specially crafted request to the web server hosting the vulnerable plugin. This likely involves a flaw in how the plugin processes user-supplied input, allowing the injection and execution of malicious PHP code, which would run with the permissions of the web server's user account, granting the attacker control over the website's files and database.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.2. A successful exploit would have a significant business impact, leading to a complete compromise of the web server. Potential consequences include the theft of sensitive data such as customer information or user credentials, financial loss, reputational damage from website defacement, and legal or compliance penalties. The compromised server could also be used to host malware or launch attacks against other systems, creating further liability for the organization.
Remediation
Immediate Action: Immediately update the Nginx Cache Purge Preload plugin to the latest patched version provided by the vendor. If this plugin is not critical to operations, a more secure alternative is to disable and completely remove it to eliminate the attack surface. It is also recommended to review all WordPress security settings to ensure they align with security best practices.
Proactive Monitoring: Monitor web server access and error logs for unusual or malformed requests targeting the plugin's files or functions. Implement file integrity monitoring to detect unauthorized changes to WordPress core files, themes, or plugins. Monitor outbound network traffic from the web server for connections to unknown or suspicious IP addresses, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with rules designed to block common RCE attack patterns. Restricting access to the WordPress administrative dashboard (/wp-admin) to trusted IP addresses can also help reduce the attack surface against vulnerabilities that require authenticated access, though it may not protect against unauthenticated RCEs.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high-severity rating and the critical impact of a Remote Code Execution vulnerability, we strongly recommend that all system administrators prioritize the immediate remediation of this flaw. All instances of the "Nginx Cache Purge Preload" plugin must be updated without delay. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its severity makes it a prime candidate for addition should widespread exploitation occur. Proactive patching is the most effective defense to prevent a full system compromise.