Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10038: CWE-266 Incorrect Privilege Assignment in letscms Binary MLM Plan

0
Medium
VulnerabilityCVE-2025-10038cvecve-2025-10038cwe-266
Published: Wed Oct 15 2025 (10/15/2025, 08:25:57 UTC)
Source: CVE Database V5
Vendor/Project: letscms
Product: Binary MLM Plan

Description

The Binary MLM Plan plugin for WordPress is vulnerable to limited Privilege Escalation in all versions up to, and including, 3.0. This is due to bmp_user role granting all users with the manage_bmp capability by default upon registration through the plugin's form. This makes it possible for unauthenticated attackers to register and manage the plugin's settings.

AI-Powered Analysis

AILast updated: 10/15/2025, 08:58:46 UTC

Technical Analysis

CVE-2025-10038 is a vulnerability categorized under CWE-266 (Incorrect Privilege Assignment) found in the Binary MLM Plan plugin for WordPress, developed by letscms. This plugin, used to implement multi-level marketing (MLM) plans, improperly assigns privileges by granting the bmp_user role the manage_bmp capability by default upon user registration through the plugin's form. This misconfiguration allows any user registering through the plugin's registration mechanism to gain management capabilities over the plugin's settings without requiring authentication or additional verification. The vulnerability affects all versions up to and including 3.0. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L, I:L), but not availability (A:N). The vulnerability could allow an unauthenticated attacker to manipulate plugin settings, potentially leading to unauthorized data access or configuration changes that could facilitate further attacks or data leakage. No known exploits are currently reported in the wild, and no official patches have been published as of the vulnerability disclosure date (October 15, 2025). The vulnerability is significant because it undermines the principle of least privilege and allows privilege escalation through a registration process that should not grant management capabilities. Organizations using this plugin should be aware of the risk and take immediate action to mitigate exposure.

Potential Impact

For European organizations, the impact of CVE-2025-10038 includes unauthorized access to and modification of the Binary MLM Plan plugin settings, which could lead to data confidentiality breaches and integrity violations. Attackers could manipulate MLM plan configurations, potentially redirecting commissions, altering user data, or injecting malicious content. This could undermine trust in business operations, especially for companies relying on MLM structures or affiliate marketing through WordPress. Although availability is not directly impacted, the integrity and confidentiality breaches could lead to reputational damage, regulatory scrutiny under GDPR for data mishandling, and financial losses. The ease of exploitation (no authentication or user interaction required) increases the risk of widespread attacks, particularly on publicly accessible WordPress sites. Organizations with public-facing MLM or affiliate marketing platforms are at higher risk. The lack of an official patch increases the window of exposure, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could also use the gained privileges as a foothold for further lateral movement or persistent access within the affected environment.

Mitigation Recommendations

1. Immediately restrict or disable user registrations through the Binary MLM Plan plugin's registration form to prevent unauthorized privilege assignment. 2. Implement custom role and capability management in WordPress to override the default bmp_user role permissions, removing the manage_bmp capability from newly registered users. 3. Monitor WordPress user registrations and plugin settings changes closely for suspicious activity or unauthorized modifications. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious registration attempts targeting the plugin. 5. Until an official patch is released, consider temporarily disabling or uninstalling the Binary MLM Plan plugin if it is not critical to business operations. 6. Keep WordPress core and all plugins updated and subscribe to vulnerability advisories for timely patch application. 7. Conduct regular security audits and penetration tests focusing on privilege escalation vectors within WordPress plugins. 8. Educate site administrators about the risks of privilege misconfigurations and the importance of least privilege principles in plugin management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-05T17:35:09.789Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7bc4f69c9730e5692f

Added to database: 10/15/2025, 8:34:03 AM

Last enriched: 10/15/2025, 8:58:46 AM

Last updated: 10/15/2025, 10:55:58 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats