CVE-2025-6754

8.8 HIGH

📋 TL;DR

The SEO Metrics WordPress plugin has a privilege escalation vulnerability that allows subscriber-level users to obtain administrator cookies and gain full administrative access. This affects WordPress sites running plugin versions 1.0.5 through 1.0.15. Attackers can exploit this to take complete control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • SEO Metrics WordPress plugin
Versions: 1.0.5 through 1.0.15
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the SEO Metrics plugin installed and at least one subscriber-level user account exists.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrator privileges, install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers gain administrative access to WordPress, allowing them to modify content, install malicious plugins/themes, or access sensitive information.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to unauthorized access attempts that can be detected and blocked.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and the vulnerability requires only subscriber-level access which is easily obtainable.
🏢 Internal Only: MEDIUM - Internal WordPress installations are still vulnerable but have reduced attack surface compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires subscriber-level access, which can be obtained through registration or compromised low-privilege accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.16 or later

Vendor Advisory: https://wordpress.org/plugins/seo-metrics-helper/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find SEO Metrics plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 1.0.16+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable SEO Metrics Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate seo-metrics-helper

Restrict AJAX Access

all

Add capability checks to WordPress AJAX handlers via custom code

Add 'current_user_can('manage_options')' check to seo_metrics_handle_connect_button_click() and seo_metrics_handle_custom_endpoint() functions

🧯 If You Can't Patch

  • Remove all subscriber-level user accounts or restrict user registration
  • Implement web application firewall rules to block suspicious AJAX requests to the SEO Metrics endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → SEO Metrics → Version number. If version is between 1.0.5 and 1.0.15 inclusive, the site is vulnerable.

Check Version:

wp plugin get seo-metrics-helper --field=version

Verify Fix Applied:

Verify plugin version is 1.0.16 or higher. Test with subscriber account attempting to access admin functions should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests from subscriber accounts to /wp-admin/admin-ajax.php with action=seo_metrics_handle_connect_button_click
  • Subscriber accounts accessing administrative functions
  • Multiple failed privilege escalation attempts

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with seo_metrics parameters from non-admin IPs
  • Unexpected cookie retrieval requests

SIEM Query:

source="wordpress.log" AND (action="seo_metrics_handle_connect_button_click" OR action="seo_metrics_handle_custom_endpoint") AND user_role="subscriber"

🔗 References

📤 Share & Export