Wordpress Privilege Escalation (CVE-2025-12882)
CVE-2025-12882
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set...
Overview
A critical security vulnerability has been identified in the Clasifico Listing plugin for WordPress. This flaw allows any visitor to your website to register themselves as a full administrator, granting them complete control over the affected WordPress site.
Vulnerability Details
In simple terms, the plugin contains a registration feature that is improperly secured. When a new user signs up, the plugin incorrectly allows them to specify their own user role (like “subscriber,” “editor,” or “administrator”) via a hidden form field. An attacker can exploit this by manually setting this field to “administrator” during registration. The plugin then creates the account with those elevated privileges without any validation, bypassing all normal security checks.
Impact Assessment
The impact of this vulnerability is severe. An unauthenticated attacker-anyone visiting the site-can easily create an administrator account for themselves. Once in control, they can:
- Install malicious plugins or themes.
- Deface the website.
- Steal sensitive user data.
- Inject backdoors for persistent access.
- Use the server to launch further attacks.
Given the low complexity of the attack and the fact it requires no prior access or credentials, this vulnerability is scored as a 9.8 (CRITICAL) on the CVSS scale.
Remediation and Mitigation
Immediate action is required to secure any website using this plugin.
Primary Solution: Update Immediately The most effective action is to update the Clasifico Listing plugin to the latest patched version (2.0.1 or higher). Plugin developers have released a fix that removes the ability for users to specify their role during registration.
Immediate Mitigation Steps: If an immediate update is not possible, take these steps:
- Disable the Plugin: Temporarily deactivate the Clasifico Listing plugin via your WordPress admin dashboard or via your hosting control panel (by renaming its folder in
/wp-content/plugins/). - Audit User Accounts: Carefully review your site’s user list (
Usersin WordPress admin) for any recently created, suspicious administrator accounts, especially those with unfamiliar email addresses. Remove any unauthorized administrators. - Monitor for Compromise: Be alert for signs of compromise, such as unfamiliar plugins, changed files, or strange website behavior.
General Best Practice: Always keep all WordPress plugins, themes, and the core installation updated to their latest versions to protect against known vulnerabilities.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...
The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restri...
The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugi...
The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's id...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...