Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11620: CWE-862 Missing Authorization in jemoreto Multiple Roles per User

0
High
VulnerabilityCVE-2025-11620cvecve-2025-11620cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 08:27:30 UTC)
Source: CVE Database V5
Vendor/Project: jemoreto
Product: Multiple Roles per User

Description

The Multiple Roles per User plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mrpu_add_multiple_roles_ui' and 'mrpu_save_multiple_user_roles' functions in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, granted the 'edit_users' capability, to edit any user's role, including promoting users to Administrator and demoting Administrators to lower-privileged roles.

AI-Powered Analysis

AILast updated: 11/18/2025, 08:53:40 UTC

Technical Analysis

CVE-2025-11620 is a vulnerability classified under CWE-862 (Missing Authorization) found in the 'Multiple Roles per User' WordPress plugin developed by jemoreto. The flaw exists because the plugin fails to perform adequate capability checks in the 'mrpu_add_multiple_roles_ui' and 'mrpu_save_multiple_user_roles' functions. These functions are responsible for managing user roles within WordPress. The vulnerability allows any authenticated user who has the 'edit_users' capability to arbitrarily modify the roles of any other user on the site. This includes the ability to elevate privileges by assigning the Administrator role to themselves or others, or to reduce the privileges of existing Administrators. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS v3.1 base score is 7.2, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user with 'edit_users'), no user interaction, and impacts on confidentiality, integrity, and availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability poses a significant risk to WordPress sites using this plugin, as it undermines the role-based access control model, potentially leading to full site compromise.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized privilege escalation within WordPress sites, resulting in potential full administrative control by malicious insiders or compromised accounts. This can lead to data breaches, defacement, insertion of malicious content, or complete site takeover. Organizations relying on WordPress for critical business functions, e-commerce, or customer engagement face risks to confidentiality, integrity, and availability of their web assets. The ability to demote administrators also risks loss of control by legitimate site owners, complicating incident response. Given WordPress's widespread use in Europe, especially among SMEs and public sector entities, exploitation could disrupt services and damage reputations. The vulnerability is particularly impactful in environments where multiple users have 'edit_users' capability, often granted to site managers or HR personnel, increasing the attack surface. The lack of known exploits currently provides a window for mitigation, but the ease of exploitation once credentials are obtained makes this a pressing concern.

Mitigation Recommendations

1. Immediately audit all users with the 'edit_users' capability and restrict this permission to only the most trusted administrators. 2. Implement strict role assignment policies and monitor logs for any unusual role changes or privilege escalations. 3. Disable or remove the 'Multiple Roles per User' plugin if it is not essential to reduce the attack surface. 4. Apply any available updates or patches from the plugin vendor as soon as they are released. 5. Employ multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of credential compromise. 6. Use WordPress security plugins that can alert on role changes or suspicious administrative activities. 7. Regularly back up WordPress sites and databases to enable quick recovery in case of compromise. 8. Consider implementing a Web Application Firewall (WAF) to detect and block suspicious requests targeting role management endpoints. 9. Educate site administrators and users about the risks of privilege misuse and the importance of secure credential management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-10T19:08:52.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c305835a0ab0a56270fe3

Added to database: 11/18/2025, 8:37:44 AM

Last enriched: 11/18/2025, 8:53:40 AM

Last updated: 11/22/2025, 1:41:48 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats