CVE-2025-2816

8.1 HIGH

📋 TL;DR

The Page View Count WordPress plugin versions 2.8.0 to 2.8.4 contain a missing capability check that allows authenticated users with Subscriber-level access or higher to modify WordPress option values. This can be exploited to cause denial of service by creating site errors or to enable certain site features like user registration. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • WordPress Page View Count plugin
Versions: 2.8.0 to 2.8.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and at least one authenticated user account (Subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical WordPress options to completely disable the site, enable open registration to create administrative accounts, or manipulate site functionality to serve malicious content.

🟠

Likely Case

Attackers with subscriber accounts modify options to cause persistent site errors, resulting in denial of service for legitimate users until options are manually restored.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary site disruption that can be quickly detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - attackers just need to call the vulnerable function with malicious parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3282975%40page-views-count&new=3282975%40page-views-count&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Page View Count' and click 'Update Now' if available. 4. Alternatively, download version 2.8.5 from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Page View Count plugin until patched

Restrict user registration

all

Disable new user registration to prevent attackers from creating accounts

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious option modifications
  • Regularly audit and backup WordPress option tables to enable quick recovery

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Page View Count version. If version is between 2.8.0 and 2.8.4 inclusive, system is vulnerable.

Check Version:

wp plugin list --name='page-views-count' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 2.8.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual option modifications in WordPress debug logs
  • Multiple failed site access attempts after option changes
  • Unexpected user registration activity

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=yellow_message_dontshow
  • Increased admin-ajax.php requests from non-admin users

SIEM Query:

source="wordpress.log" AND ("option_name" OR "update_option") AND "page-views-count"

🔗 References

📤 Share & Export