Wordpress Privilege Escalation (CVE-2025-12981)
CVE-2025-12981
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...
Overview
A critical privilege escalation vulnerability has been identified in the Listee theme for WordPress. The flaw resides in the theme’s bundled listee-core plugin and affects all versions up to and including 1.1.6. Due to improper security validation, an attacker can exploit this vulnerability to gain full administrative control over a WordPress site.
Vulnerability Details
In simple terms, the vulnerability exists in the site’s user registration process. The listee-core plugin contains a function for handling new user registrations. This function fails to properly check or “sanitize” the user_role parameter that is submitted during registration. Because this check is broken, an attacker can manually set this parameter to “administrator” when creating a new account.
Normally, users can only register with low-privilege roles like “subscriber.” This security failure allows anyone to bypass this restriction entirely.
Impact
The impact of this vulnerability is severe. An unauthenticated attacker-meaning they do not need an account or password to start-can create a new user account with full Administrator privileges. Once granted administrator access, an attacker can:
- Deface or take down the website.
- Steal sensitive data.
- Install malicious plugins or backdoors.
- Compromise user information.
- Use the site to launch further attacks.
Given the ease of exploitation and the high level of access granted, this vulnerability is rated as CRITICAL with a CVSS score of 9.8.
Remediation and Mitigation
Immediate action is required to secure affected websites.
1. Update Immediately: The primary solution is to update the Listee theme to a patched version beyond 1.1.6. As soon as the theme developer releases an update, apply it. Check your WordPress dashboard for available updates.
2. Mitigation Steps (If Update is Not Yet Available):
- Disable User Registration: If your site does not require public user registration, disable it immediately. Go to Settings > General in your WordPress dashboard and uncheck the option “Anyone can register.”
- Temporarily Deactivate the Theme: If possible, switch to a default WordPress theme (like Twenty Twenty-Four) until a patch is applied. Warning: This may change your site’s appearance.
3. Post-Exploitation Checks: If you suspect your site may have been compromised, take these steps:
- Review your user list in Users > All Users and investigate any unfamiliar administrator accounts, especially recently created ones.
- Consider using a security plugin to scan for malware and unexpected file changes.
- Audit any plugins or themes installed around the time of a potential breach.
Always maintain regular, verified backups of your website to enable recovery in case of an incident.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set...
The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restri...
The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugi...
The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's id...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...