Critical (9.8)

Wordpress Privilege Escalation (CVE-2025-12981)

CVE-2025-12981

The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...

Affected: WordPress

Overview

A critical privilege escalation vulnerability has been identified in the Listee theme for WordPress. The flaw resides in the theme’s bundled listee-core plugin and affects all versions up to and including 1.1.6. Due to improper security validation, an attacker can exploit this vulnerability to gain full administrative control over a WordPress site.

Vulnerability Details

In simple terms, the vulnerability exists in the site’s user registration process. The listee-core plugin contains a function for handling new user registrations. This function fails to properly check or “sanitize” the user_role parameter that is submitted during registration. Because this check is broken, an attacker can manually set this parameter to “administrator” when creating a new account.

Normally, users can only register with low-privilege roles like “subscriber.” This security failure allows anyone to bypass this restriction entirely.

Impact

The impact of this vulnerability is severe. An unauthenticated attacker-meaning they do not need an account or password to start-can create a new user account with full Administrator privileges. Once granted administrator access, an attacker can:

  • Deface or take down the website.
  • Steal sensitive data.
  • Install malicious plugins or backdoors.
  • Compromise user information.
  • Use the site to launch further attacks.

Given the ease of exploitation and the high level of access granted, this vulnerability is rated as CRITICAL with a CVSS score of 9.8.

Remediation and Mitigation

Immediate action is required to secure affected websites.

1. Update Immediately: The primary solution is to update the Listee theme to a patched version beyond 1.1.6. As soon as the theme developer releases an update, apply it. Check your WordPress dashboard for available updates.

2. Mitigation Steps (If Update is Not Yet Available):

  • Disable User Registration: If your site does not require public user registration, disable it immediately. Go to Settings > General in your WordPress dashboard and uncheck the option “Anyone can register.”
  • Temporarily Deactivate the Theme: If possible, switch to a default WordPress theme (like Twenty Twenty-Four) until a patch is applied. Warning: This may change your site’s appearance.

3. Post-Exploitation Checks: If you suspect your site may have been compromised, take these steps:

  • Review your user list in Users > All Users and investigate any unfamiliar administrator accounts, especially recently created ones.
  • Consider using a security plugin to scan for malware and unexpected file changes.
  • Audit any plugins or themes installed around the time of a potential breach.

Always maintain regular, verified backups of your website to enable recovery in case of an incident.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other WordPress Vulnerabilities

View all WordPress vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.