Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11985: CWE-862 Missing Authorization in nootheme Realty Portal

0
High
VulnerabilityCVE-2025-11985cvecve-2025-11985cwe-862
Published: Fri Nov 21 2025 (11/21/2025, 07:31:58 UTC)
Source: CVE Database V5
Vendor/Project: nootheme
Product: Realty Portal

Description

The Realty Portal plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'rp_save_property_settings' function in versions 0.1 to 0.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

AI-Powered Analysis

AILast updated: 11/21/2025, 08:39:52 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11985 affects the Realty Portal plugin for WordPress, specifically versions 0.1 through 0.4.1. The root cause is a missing authorization check (CWE-862) in the 'rp_save_property_settings' function, which fails to verify if the authenticated user has sufficient privileges before allowing modifications to critical site options. This flaw permits any authenticated user with at least Subscriber-level access to update arbitrary WordPress options, including changing the default role assigned to new users to 'administrator' and enabling user registration. By doing so, an attacker can create new administrative accounts without needing higher privileges initially, effectively escalating their privileges to full site administrator. The vulnerability is remotely exploitable over the network without requiring user interaction beyond initial authentication. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and privileges required. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to WordPress sites using the Realty Portal plugin, especially those that allow user registration or have multiple authenticated users with low privileges.

Potential Impact

For European organizations, this vulnerability could lead to complete site compromise, resulting in unauthorized data modification, data leakage, and potential defacement or service disruption. Real estate companies, property management firms, and agencies using the Realty Portal plugin on WordPress are at risk of attackers gaining administrative control, which could be leveraged to steal sensitive client information, manipulate listings, or deploy further malware. The ability to escalate privileges from a low-level user to administrator undermines the integrity of the entire WordPress installation and any connected systems. Given the widespread use of WordPress across Europe and the growing digitalization of real estate services, the impact could be significant, affecting business continuity, regulatory compliance (e.g., GDPR), and customer trust. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or against customers.

Mitigation Recommendations

Immediate mitigation steps include restricting user roles to trusted individuals only and disabling user registration until a patch is available. Administrators should audit existing user roles and permissions to ensure no unauthorized accounts have been created. Implementing a Web Application Firewall (WAF) with rules to detect and block unauthorized attempts to invoke 'rp_save_property_settings' or modify critical options can reduce risk. Monitoring logs for unusual changes to site options or new administrator accounts is essential. Organizations should also consider isolating WordPress instances and limiting plugin usage to trusted and actively maintained plugins. Since no official patch is currently available, contacting the plugin vendor for updates or applying custom authorization checks in the plugin code can serve as temporary fixes. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T18:46:05.784Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69202359cf2d47c38997b49c

Added to database: 11/21/2025, 8:31:21 AM

Last enriched: 11/21/2025, 8:39:52 AM

Last updated: 11/22/2025, 12:24:48 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats