Impact
This is a Remote Code Execution (RCE) vulnerability affecting the Nginx Cache Purge Preload plugin for WordPress, in all versions up to and including v2.1.2.
An authenticated attacker with Administrator privileges could exploit unsanitized use of the $_SERVER['HTTP_REFERER'] header in the nppp_preload_cache_on_update() function. The value was passed into a shell command using shell_exec() without proper validation or escaping, enabling arbitrary command execution on the server.
Researcher: cynau1t (TianGong)
Patches
The vulnerability was fully patched in version v2.1.3.
To prevent exploitation, the following mitigations were implemented:
- ✅ Sanitized using esc_url_raw( wp_unslash(...) )
- ✅ Validated URL using FILTER_VALIDATE_URL
- ✅ Enforced same-origin policy by comparing the referrer domain with home_url() via wp_parse_url()
- ✅ Use escapechellarg
All versions up to and including v2.1.2 are affected.
Users should upgrade to version v2.1.3 or later immediately to remain secure.
Workarounds
There is no safe workaround for this vulnerability in affected versions. Disabling admin-bar cache actions or removing nppp_preload_cache_on_update() manually will break plugin, and it is not recommended.
The only reliable remediation is to upgrade to version v2.1.3 or later.
References
🔒 CVE: CVE-2025-6213
🧠 Wordfence advisory: wordfence.com
📦 GitHub Advisory: GHSA-7653-r8cq-rf8w
Patch commits: efdd1bf 712d737
Impact
This is a Remote Code Execution (RCE) vulnerability affecting the Nginx Cache Purge Preload plugin for WordPress, in all versions up to and including v2.1.2.
An authenticated attacker with Administrator privileges could exploit unsanitized use of the $_SERVER['HTTP_REFERER'] header in the nppp_preload_cache_on_update() function. The value was passed into a shell command using shell_exec() without proper validation or escaping, enabling arbitrary command execution on the server.
Researcher: cynau1t (TianGong)
Patches
The vulnerability was fully patched in version v2.1.3.
To prevent exploitation, the following mitigations were implemented:
Patch commits: efdd1bf 712d737 f5ab194 8a9fa74 9b2f251
All versions up to and including v2.1.2 are affected.
Users should upgrade to version v2.1.3 or later immediately to remain secure.
Workarounds
There is no safe workaround for this vulnerability in affected versions. Disabling admin-bar cache actions or removing nppp_preload_cache_on_update() manually will break plugin, and it is not recommended.
The only reliable remediation is to upgrade to version v2.1.3 or later.
References
🔒 CVE: CVE-2025-6213
🧠 Wordfence advisory: wordfence.com
📦 GitHub Advisory: GHSA-7653-r8cq-rf8w
Patch commits: efdd1bf 712d737