CVE-2025-11985: CWE-862 Missing Authorization in nootheme Realty Portal
The Realty Portal plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'rp_save_property_settings' function in versions 0.1 to 0.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11985 affects the Realty Portal plugin for WordPress, specifically versions 0.1 through 0.4.1. The root cause is a missing authorization check (CWE-862) in the 'rp_save_property_settings' function, which fails to verify if the authenticated user has sufficient privileges before allowing modifications to critical site options. This flaw permits any authenticated user with at least Subscriber-level access to update arbitrary WordPress options, including changing the default role assigned to new users to 'administrator' and enabling user registration. By doing so, an attacker can create new administrative accounts without needing higher privileges initially, effectively escalating their privileges to full site administrator. The vulnerability is remotely exploitable over the network without requiring user interaction beyond initial authentication. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and privileges required. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to WordPress sites using the Realty Portal plugin, especially those that allow user registration or have multiple authenticated users with low privileges.
Potential Impact
For European organizations, this vulnerability could lead to complete site compromise, resulting in unauthorized data modification, data leakage, and potential defacement or service disruption. Real estate companies, property management firms, and agencies using the Realty Portal plugin on WordPress are at risk of attackers gaining administrative control, which could be leveraged to steal sensitive client information, manipulate listings, or deploy further malware. The ability to escalate privileges from a low-level user to administrator undermines the integrity of the entire WordPress installation and any connected systems. Given the widespread use of WordPress across Europe and the growing digitalization of real estate services, the impact could be significant, affecting business continuity, regulatory compliance (e.g., GDPR), and customer trust. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or against customers.
Mitigation Recommendations
Immediate mitigation steps include restricting user roles to trusted individuals only and disabling user registration until a patch is available. Administrators should audit existing user roles and permissions to ensure no unauthorized accounts have been created. Implementing a Web Application Firewall (WAF) with rules to detect and block unauthorized attempts to invoke 'rp_save_property_settings' or modify critical options can reduce risk. Monitoring logs for unusual changes to site options or new administrator accounts is essential. Organizations should also consider isolating WordPress instances and limiting plugin usage to trusted and actively maintained plugins. Since no official patch is currently available, contacting the plugin vendor for updates or applying custom authorization checks in the plugin code can serve as temporary fixes. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11985: CWE-862 Missing Authorization in nootheme Realty Portal
Description
The Realty Portal plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'rp_save_property_settings' function in versions 0.1 to 0.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-11985 affects the Realty Portal plugin for WordPress, specifically versions 0.1 through 0.4.1. The root cause is a missing authorization check (CWE-862) in the 'rp_save_property_settings' function, which fails to verify if the authenticated user has sufficient privileges before allowing modifications to critical site options. This flaw permits any authenticated user with at least Subscriber-level access to update arbitrary WordPress options, including changing the default role assigned to new users to 'administrator' and enabling user registration. By doing so, an attacker can create new administrative accounts without needing higher privileges initially, effectively escalating their privileges to full site administrator. The vulnerability is remotely exploitable over the network without requiring user interaction beyond initial authentication. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and privileges required. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to WordPress sites using the Realty Portal plugin, especially those that allow user registration or have multiple authenticated users with low privileges.
Potential Impact
For European organizations, this vulnerability could lead to complete site compromise, resulting in unauthorized data modification, data leakage, and potential defacement or service disruption. Real estate companies, property management firms, and agencies using the Realty Portal plugin on WordPress are at risk of attackers gaining administrative control, which could be leveraged to steal sensitive client information, manipulate listings, or deploy further malware. The ability to escalate privileges from a low-level user to administrator undermines the integrity of the entire WordPress installation and any connected systems. Given the widespread use of WordPress across Europe and the growing digitalization of real estate services, the impact could be significant, affecting business continuity, regulatory compliance (e.g., GDPR), and customer trust. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or against customers.
Mitigation Recommendations
Immediate mitigation steps include restricting user roles to trusted individuals only and disabling user registration until a patch is available. Administrators should audit existing user roles and permissions to ensure no unauthorized accounts have been created. Implementing a Web Application Firewall (WAF) with rules to detect and block unauthorized attempts to invoke 'rp_save_property_settings' or modify critical options can reduce risk. Monitoring logs for unusual changes to site options or new administrator accounts is essential. Organizations should also consider isolating WordPress instances and limiting plugin usage to trusted and actively maintained plugins. Since no official patch is currently available, contacting the plugin vendor for updates or applying custom authorization checks in the plugin code can serve as temporary fixes. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-20T18:46:05.784Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69202359cf2d47c38997b49c
Added to database: 11/21/2025, 8:31:21 AM
Last enriched: 11/21/2025, 8:39:52 AM
Last updated: 11/22/2025, 12:24:48 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-12678
UnknownCVE-2025-11933: CWE-20 Improper Input Validation in wofSSL wolfSSL
LowCVE-2025-65111: CWE-277: Insecure Inherited Permissions in authzed spicedb
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.