CVE-2025-54741

8.6 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Tyler Moore Super Blank WordPress plugin that allows unauthorized users to delete arbitrary content. The vulnerability affects all WordPress sites running Super Blank plugin versions up to and including 1.2.0. Attackers can exploit this to remove posts, pages, or other content without proper authentication.

💻 Affected Systems

Products:
  • Tyler Moore Super Blank WordPress Plugin
Versions: from n/a through <= 1.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website defacement or destruction through mass deletion of critical content, potentially causing business disruption and data loss.

🟠

Likely Case

Selective deletion of important posts, pages, or custom post types, leading to content loss and website integrity issues.

🟢

If Mitigated

No impact if proper authorization checks are implemented or the plugin is disabled/removed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows arbitrary content deletion without authentication. Public exploit details are available in the Patchstack database.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 1.2.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/super-blank/vulnerability/wordpress-super-blank-plugin-1-2-0-arbitrary-content-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Super Blank' plugin
4. Click 'Update Now' if update is available
5. If no update available, deactivate and delete the plugin immediately

🔧 Temporary Workarounds

Disable Super Blank Plugin

all

Deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate super-blank

Remove Plugin Files

linux

Completely remove the plugin files from the WordPress installation

rm -rf /path/to/wordpress/wp-content/plugins/super-blank/

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to vulnerable plugin endpoints
  • Restrict access to WordPress admin area using IP whitelisting or additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Super Blank version <= 1.2.0

Check Version:

wp plugin get super-blank --field=version

Verify Fix Applied:

Verify Super Blank plugin is either updated to version >1.2.0 or completely removed from the system

📡 Detection & Monitoring

Log Indicators:

  • Unusual DELETE requests to WordPress admin-ajax.php or plugin-specific endpoints
  • Multiple 200/403 responses from unauthenticated users attempting content deletion

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action parameters related to content deletion
  • Requests from unexpected IP addresses to plugin-specific endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "super-blank") AND (http_method="POST" OR http_method="DELETE") AND status_code=200

🔗 References

📤 Share & Export