Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26173 | The LWSCache plugin for WordPress is vulnerable to unauthorized modification of data due to improper authorization on the lwscache_activatePlugin() function in all versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate arbitrary whitelisted LWS plugins. |
Mon, 01 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aurelienlws
Aurelienlws lwscache Wordpress Wordpress wordpress |
|
| Vendors & Products |
Aurelienlws
Aurelienlws lwscache Wordpress Wordpress wordpress |
Fri, 29 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The LWSCache plugin for WordPress is vulnerable to unauthorized modification of data due to improper authorization on the lwscache_activatePlugin() function in all versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate arbitrary whitelisted LWS plugins. | |
| Title | LWSCache <= 2.8.5 - Missing Authorization to Authenticated (Subscriber+) Limited Plugin Activation via lwscache_activatePlugin Function | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:32:35.860Z
Reserved: 2025-07-24T21:11:54.996Z
Link: CVE-2025-8147
Updated: 2025-08-29T12:03:51.687Z
Status : Deferred
Published: 2025-08-29T05:15:31.483
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-8147
No data.
OpenCVE Enrichment
Updated: 2026-04-22T17:00:12Z
EUVD