Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10706: CWE-862 Missing Authorization in Cridio Studio ClassifiedPro - reCommerce WordPress Theme

0
High
VulnerabilityCVE-2025-10706cvecve-2025-10706cwe-862
Published: Thu Oct 16 2025 (10/16/2025, 06:47:29 UTC)
Source: CVE Database V5
Vendor/Project: Cridio Studio
Product: ClassifiedPro - reCommerce WordPress Theme

Description

The Classified Pro theme for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check in the 'cwp_addons_update_plugin_cb' function in all versions up to, and including, 1.0.14. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the affected site's server which may make remote code execution possible. Note: The required nonce for the vulnerability is in the CubeWP Framework plugin.

AI-Powered Analysis

AILast updated: 10/16/2025, 07:16:38 UTC

Technical Analysis

CVE-2025-10706 is a vulnerability classified under CWE-862 (Missing Authorization) found in the ClassifiedPro - reCommerce WordPress theme developed by Cridio Studio. The vulnerability exists in the 'cwp_addons_update_plugin_cb' function, which lacks proper capability checks before allowing plugin installation. This flaw affects all versions up to and including 1.0.14. An authenticated attacker with subscriber-level access or higher can exploit this vulnerability to install arbitrary plugins on the WordPress site. Since plugins can contain malicious code, this can lead to remote code execution (RCE) on the server hosting the WordPress instance. The attack does not require user interaction beyond authentication and leverages a nonce provided by the CubeWP Framework plugin, which is a prerequisite for the exploit. The CVSS v3.1 score is 8.8, indicating a high severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. No patches are currently available, and no exploits have been reported in the wild yet. The vulnerability is particularly dangerous because subscriber-level users are often considered low-privilege, and this flaw escalates their capabilities significantly.

Potential Impact

For European organizations, especially those operating WordPress sites with the ClassifiedPro theme, this vulnerability poses a significant risk. Attackers gaining subscriber-level access—potentially through phishing, credential stuffing, or other means—can install malicious plugins, leading to full server compromise via remote code execution. This can result in data breaches, defacement, service disruption, or use of the compromised server as a pivot point for further attacks. Organizations handling sensitive personal data under GDPR may face regulatory penalties if such breaches occur. The impact extends to e-commerce platforms, classified ad sites, and other business-critical applications using this theme. The vulnerability undermines trust in the affected websites and can cause reputational damage. Given the widespread use of WordPress in Europe and the popularity of themes like ClassifiedPro, the threat surface is considerable. The lack of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using the ClassifiedPro theme, ensuring that subscriber-level users are strictly controlled and monitored. 2. Restrict plugin installation capabilities to trusted administrators only, and consider disabling plugin installation for lower-privilege users via custom role management plugins or WordPress configuration. 3. Monitor plugin installation logs and file system changes for unauthorized activity. 4. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious plugin installation requests targeting the vulnerable function. 5. Isolate WordPress environments to limit the impact of potential RCE, such as running sites in containers or with strict OS-level permissions. 6. Engage with the theme vendor (Cridio Studio) for patches or updates and apply them promptly once released. 7. Educate users about credential security to prevent unauthorized access at subscriber level. 8. Consider temporarily disabling or removing the CubeWP Framework plugin if feasible, as it provides the nonce required for exploitation. 9. Conduct penetration testing focusing on privilege escalation vectors related to plugin management. 10. Maintain regular backups and incident response plans to recover quickly if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T04:43:46.331Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f0983c20d29eed058254a6

Added to database: 10/16/2025, 7:01:16 AM

Last enriched: 10/16/2025, 7:16:38 AM

Last updated: 10/16/2025, 9:37:57 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats