Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12882: CWE-269 Improper Privilege Management in SmartDataSoft Clasifico Listing

0
Critical
VulnerabilityCVE-2025-12882cvecve-2025-12882cwe-269
Published: Thu Feb 19 2026 (02/19/2026, 03:25:15 UTC)
Source: CVE Database V5
Vendor/Project: SmartDataSoft
Product: Clasifico Listing

Description

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an account with the administrator role.

AI-Powered Analysis

AILast updated: 02/19/2026, 04:25:54 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12882 affects the Clasifico Listing plugin for WordPress, developed by SmartDataSoft. This plugin allows users to register new accounts on WordPress sites, but due to improper privilege management (CWE-269), it permits unauthenticated attackers to specify the 'listing_user_role' parameter during registration. Because the plugin fails to validate or restrict this parameter, attackers can assign themselves elevated roles, including administrator privileges, upon account creation. This results in a direct privilege escalation without requiring any prior authentication or user interaction. The vulnerability impacts all versions up to and including 2.0 of the plugin. The CVSS 3.1 base score is 9.8, reflecting the critical nature of the flaw with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation would allow attackers to fully compromise the affected WordPress site, including modifying content, installing malware, or stealing sensitive data. No official patches or mitigations have been published yet, and no known exploits are reported in the wild, but the vulnerability is straightforward to exploit. The root cause is the plugin's failure to enforce proper role assignment controls during user registration, violating the principle of least privilege and secure privilege management.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those relying on WordPress sites with the Clasifico Listing plugin installed and user registration enabled. Successful exploitation grants attackers administrative control over the website, enabling them to manipulate content, access sensitive user data, deploy malware, or pivot to internal networks. This can lead to data breaches, reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. E-commerce platforms, service providers, and community portals using this plugin are particularly vulnerable. Given the critical severity and ease of exploitation, attackers could rapidly compromise multiple sites, potentially leading to widespread impact across sectors such as retail, finance, healthcare, and public services in Europe. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks. Additionally, compromised sites could be used to launch further attacks or distribute malicious content, amplifying the threat landscape.

Mitigation Recommendations

Immediate mitigation steps include disabling user registration on affected WordPress sites using the Clasifico Listing plugin until a vendor patch is available. Administrators should audit existing user accounts for unauthorized administrator roles and remove any suspicious accounts. Implement strict input validation and sanitization to prevent manipulation of the 'listing_user_role' parameter. Employ web application firewalls (WAFs) with custom rules to detect and block requests attempting to set elevated roles during registration. Monitor logs for unusual registration activity or privilege escalations. Once the vendor releases a patch, apply it promptly and verify that role assignment controls are enforced correctly. Consider restricting plugin usage to trusted users or replacing it with alternative plugins that follow secure privilege management practices. Educate site administrators on secure configuration and the risks of improper role assignment. Regularly update WordPress core and plugins to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T16:19:24.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69968d656aea4a407a390130

Added to database: 2/19/2026, 4:11:17 AM

Last enriched: 2/19/2026, 4:25:54 AM

Last updated: 2/20/2026, 9:50:51 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats