Etavrian
keyboard_arrow_right Created with Sketch.
News
keyboard_arrow_right Created with Sketch.

Seraphinite Accelerator Flaws Let Subscribers See Cache Data, Wipe Logs - Is Your Site Affected?

Reviewed:
Andrii Daniv
3
min read
Mar 4, 2026
Minimalist caching stack tech illustration with activity logs red alert funnel pointing plugin settings

Wordfence has disclosed two security vulnerabilities in the Seraphinite Accelerator WordPress plugin, which runs on more than 60,000 sites. The issues affect all plugin versions through 2.28.14 and are fixed in version 2.28.15. The flaws can be exploited by logged-in users with Subscriber-level access or higher on affected WordPress installations.

Seraphinite Accelerator WordPress Plugin Vulnerabilities Affect 60K Sites
Seraphinite Accelerator vulnerabilities impact more than 60,000 WordPress sites.

Key details: Seraphinite Accelerator WordPress plugin vulnerabilities

Wordfence reports that the Seraphinite Accelerator plugin exposes two authenticated vulnerabilities through an AJAX endpoint named seraph_accel_api, which processes internal Admin API calls. The endpoint accepts specific function parameters without properly confirming user permissions.

  • Affected software: Seraphinite Accelerator WordPress plugin
  • Active installations: more than 60,000 WordPress websites
  • Affected versions: all releases up to and including 2.28.14
  • Patched version: 2.28.15, which adds permission checks for the affected API functions
  • Vulnerability 1: Sensitive information exposure via seraph_accel_api with fn=GetData, handled by OnAdminApi_GetData() without capability checks
  • Vulnerability 2: Missing authorization via seraph_accel_api with fn=LogClear, allowing unauthorized clearing of debug and operational logs
  • Required user level: any authenticated user with the Subscriber role or higher on the affected WordPress site
  • Accessible data: cache status details, scheduled task information, and external database state returned by the GetData function

According to Wordfence, the GetData function can reveal operational information about caching, scheduled tasks, and external database connections. The LogClear function can be triggered by subscriber-level users to erase the plugin's debug and operational logs.

The plugin developers addressed these issues in version 2.28.15 by limiting access to both functions with explicit capability checks. Site owners using Seraphinite Accelerator are advised to update to version 2.28.15 or later.

Background context on Seraphinite Accelerator and WordPress permissions

Seraphinite Accelerator is a performance plugin designed to speed up WordPress sites through page caching. It creates static copies of pages so servers do not regenerate them for each visit. The plugin also supports GZip, Deflate, and Brotli compression and implements browser caching for returning visitors.

The vulnerabilities stem from missing capability checks within the plugin's Admin API dispatcher. WordPress plugins typically require the manage_options capability before exposing internal configuration or operational data to users. In this case, the relevant functions accepted requests from any authenticated user without verifying that capability.

The affected code handles incoming seraph_accel_api AJAX requests, reads the fn parameter, and routes calls to handler methods. For GetData, this mapping reached OnAdminApi_GetData(), which returned detailed runtime information. For LogClear, the same pathway reached a handler that cleared stored logs without confirming that the caller was an administrator.

Version 2.28.15 introduces capability checks around the GetData and LogClear API functions. The plugin changelog notes that these functions were previously callable by users without the manage_options privilege. The update restricts them to authorized administrators by validating that capability.

Source citations and official advisories

Wordfence documents both vulnerabilities in its public threat intelligence database. The first advisory covers exposure of sensitive operational data through the GetData function, while the second describes missing authorization checks that allow subscriber-level users to clear logs.

  • Wordfence advisory on sensitive information exposure via GetData: advisory
  • Wordfence advisory on missing authorization for LogClear log clearing: advisory
Quickly summarize and get insighs with: 
Author
Etavrian AI
Etavrian AI is developed by Andrii Daniv to produce and optimize content for etavrian.com website.
Reviewed
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Quickly summarize and get insighs with: 
Table of contents