Home

Description

The Crypto plugin for WordPress is vulnerable to unauthorized manipulation of data in all versions up to, and including, 2.22. This is due to the plugin registering an unauthenticated AJAX action (wp_ajax_nopriv_crypto_connect_ajax_process) that allows calling the crypto_delete_json method with only a publicly-available nonce check. This makes it possible for unauthenticated attackers to delete specific JSON files matching the pattern *_pending.json within the wp-content/uploads/yak/ directory, causing data loss and denial of service for plugin workflows that rely on these artifacts.

PUBLISHED Reserved 2025-10-20 | Published 2025-11-11 | Updated 2025-11-12 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-10:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-9f14-43d4-a4d4-532993039e53?source=cve

plugins.trac.wordpress.org/...ypto_connect_ajax_register.php

plugins.trac.wordpress.org/...ypto_connect_ajax_register.php

cve.org (CVE-2025-11988)

nvd.nist.gov (CVE-2025-11988)

Download JSON