CVE-2025-10038: CWE-266 Incorrect Privilege Assignment in letscms Binary MLM Plan
The Binary MLM Plan plugin for WordPress is vulnerable to limited Privilege Escalation in all versions up to, and including, 3.0. This is due to bmp_user role granting all users with the manage_bmp capability by default upon registration through the plugin's form. This makes it possible for unauthenticated attackers to register and manage the plugin's settings.
AI Analysis
Technical Summary
CVE-2025-10038 is a vulnerability categorized under CWE-266 (Incorrect Privilege Assignment) found in the Binary MLM Plan plugin for WordPress, developed by letscms. This plugin, used to implement multi-level marketing (MLM) plans, improperly assigns privileges by granting the bmp_user role the manage_bmp capability by default upon user registration through the plugin's form. This misconfiguration allows any user registering through the plugin's registration mechanism to gain management capabilities over the plugin's settings without requiring authentication or additional verification. The vulnerability affects all versions up to and including 3.0. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L, I:L), but not availability (A:N). The vulnerability could allow an unauthenticated attacker to manipulate plugin settings, potentially leading to unauthorized data access or configuration changes that could facilitate further attacks or data leakage. No known exploits are currently reported in the wild, and no official patches have been published as of the vulnerability disclosure date (October 15, 2025). The vulnerability is significant because it undermines the principle of least privilege and allows privilege escalation through a registration process that should not grant management capabilities. Organizations using this plugin should be aware of the risk and take immediate action to mitigate exposure.
Potential Impact
For European organizations, the impact of CVE-2025-10038 includes unauthorized access to and modification of the Binary MLM Plan plugin settings, which could lead to data confidentiality breaches and integrity violations. Attackers could manipulate MLM plan configurations, potentially redirecting commissions, altering user data, or injecting malicious content. This could undermine trust in business operations, especially for companies relying on MLM structures or affiliate marketing through WordPress. Although availability is not directly impacted, the integrity and confidentiality breaches could lead to reputational damage, regulatory scrutiny under GDPR for data mishandling, and financial losses. The ease of exploitation (no authentication or user interaction required) increases the risk of widespread attacks, particularly on publicly accessible WordPress sites. Organizations with public-facing MLM or affiliate marketing platforms are at higher risk. The lack of an official patch increases the window of exposure, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could also use the gained privileges as a foothold for further lateral movement or persistent access within the affected environment.
Mitigation Recommendations
1. Immediately restrict or disable user registrations through the Binary MLM Plan plugin's registration form to prevent unauthorized privilege assignment. 2. Implement custom role and capability management in WordPress to override the default bmp_user role permissions, removing the manage_bmp capability from newly registered users. 3. Monitor WordPress user registrations and plugin settings changes closely for suspicious activity or unauthorized modifications. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious registration attempts targeting the plugin. 5. Until an official patch is released, consider temporarily disabling or uninstalling the Binary MLM Plan plugin if it is not critical to business operations. 6. Keep WordPress core and all plugins updated and subscribe to vulnerability advisories for timely patch application. 7. Conduct regular security audits and penetration tests focusing on privilege escalation vectors within WordPress plugins. 8. Educate site administrators about the risks of privilege misconfigurations and the importance of least privilege principles in plugin management.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10038: CWE-266 Incorrect Privilege Assignment in letscms Binary MLM Plan
Description
The Binary MLM Plan plugin for WordPress is vulnerable to limited Privilege Escalation in all versions up to, and including, 3.0. This is due to bmp_user role granting all users with the manage_bmp capability by default upon registration through the plugin's form. This makes it possible for unauthenticated attackers to register and manage the plugin's settings.
AI-Powered Analysis
Technical Analysis
CVE-2025-10038 is a vulnerability categorized under CWE-266 (Incorrect Privilege Assignment) found in the Binary MLM Plan plugin for WordPress, developed by letscms. This plugin, used to implement multi-level marketing (MLM) plans, improperly assigns privileges by granting the bmp_user role the manage_bmp capability by default upon user registration through the plugin's form. This misconfiguration allows any user registering through the plugin's registration mechanism to gain management capabilities over the plugin's settings without requiring authentication or additional verification. The vulnerability affects all versions up to and including 3.0. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L, I:L), but not availability (A:N). The vulnerability could allow an unauthenticated attacker to manipulate plugin settings, potentially leading to unauthorized data access or configuration changes that could facilitate further attacks or data leakage. No known exploits are currently reported in the wild, and no official patches have been published as of the vulnerability disclosure date (October 15, 2025). The vulnerability is significant because it undermines the principle of least privilege and allows privilege escalation through a registration process that should not grant management capabilities. Organizations using this plugin should be aware of the risk and take immediate action to mitigate exposure.
Potential Impact
For European organizations, the impact of CVE-2025-10038 includes unauthorized access to and modification of the Binary MLM Plan plugin settings, which could lead to data confidentiality breaches and integrity violations. Attackers could manipulate MLM plan configurations, potentially redirecting commissions, altering user data, or injecting malicious content. This could undermine trust in business operations, especially for companies relying on MLM structures or affiliate marketing through WordPress. Although availability is not directly impacted, the integrity and confidentiality breaches could lead to reputational damage, regulatory scrutiny under GDPR for data mishandling, and financial losses. The ease of exploitation (no authentication or user interaction required) increases the risk of widespread attacks, particularly on publicly accessible WordPress sites. Organizations with public-facing MLM or affiliate marketing platforms are at higher risk. The lack of an official patch increases the window of exposure, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could also use the gained privileges as a foothold for further lateral movement or persistent access within the affected environment.
Mitigation Recommendations
1. Immediately restrict or disable user registrations through the Binary MLM Plan plugin's registration form to prevent unauthorized privilege assignment. 2. Implement custom role and capability management in WordPress to override the default bmp_user role permissions, removing the manage_bmp capability from newly registered users. 3. Monitor WordPress user registrations and plugin settings changes closely for suspicious activity or unauthorized modifications. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious registration attempts targeting the plugin. 5. Until an official patch is released, consider temporarily disabling or uninstalling the Binary MLM Plan plugin if it is not critical to business operations. 6. Keep WordPress core and all plugins updated and subscribe to vulnerability advisories for timely patch application. 7. Conduct regular security audits and penetration tests focusing on privilege escalation vectors within WordPress plugins. 8. Educate site administrators about the risks of privilege misconfigurations and the importance of least privilege principles in plugin management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-05T17:35:09.789Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7bc4f69c9730e5692f
Added to database: 10/15/2025, 8:34:03 AM
Last enriched: 10/15/2025, 8:58:46 AM
Last updated: 10/15/2025, 10:55:58 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumCVE-2025-11722: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Woocommerce Category and Products Accordion Panel
HighCVE-2025-11701: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumCVE-2025-11692: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.