Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12981: CWE-269 Improper Privilege Management in dreamstechnologies Listee

0
Critical
VulnerabilityCVE-2025-12981cvecve-2025-12981cwe-269
Published: Fri Feb 27 2026 (02/27/2026, 06:43:49 UTC)
Source: CVE Database V5
Vendor/Project: dreamstechnologies
Product: Listee

Description

CVE-2025-12981 is a critical privilege escalation vulnerability in the Listee WordPress theme up to version 1. 1. 6. It stems from improper privilege management due to a broken validation check in the bundled listee-core plugin's user registration function. This flaw allows unauthenticated attackers to manipulate the user_role parameter during registration and gain Administrator privileges. The vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. No known exploits are currently reported in the wild. Organizations using the Listee theme are at significant risk of full site compromise if unpatched. Immediate mitigation involves restricting or patching the user registration process and monitoring for suspicious registrations.

AI-Powered Analysis

AILast updated: 02/27/2026, 07:25:36 UTC

Technical Analysis

CVE-2025-12981 is a critical security vulnerability affecting the Listee WordPress theme developed by dreamstechnologies, specifically versions up to and including 1.1.6. The root cause is a broken validation mechanism in the bundled listee-core plugin's user registration function, which fails to properly sanitize the user_role parameter. This improper privilege management (CWE-269) allows unauthenticated attackers to register accounts with Administrator privileges by manipulating this parameter during the registration process. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability of affected WordPress sites. Successful exploitation results in full administrative control over the website, enabling attackers to modify content, install malicious plugins, steal sensitive data, or disrupt service. Although no known exploits have been reported in the wild yet, the simplicity of exploitation and the widespread use of WordPress and its themes make this a significant threat. The vulnerability was reserved in November 2025 and published in February 2026, but no official patches or updates have been linked yet, increasing the urgency for site administrators to apply mitigations or workarounds. This vulnerability highlights the importance of secure input validation and privilege assignment in WordPress themes and plugins.

Potential Impact

The impact of CVE-2025-12981 is severe for organizations running WordPress sites with the Listee theme. An attacker can gain full administrative privileges without authentication, leading to complete site takeover. This compromises confidentiality by exposing sensitive user and business data, integrity by allowing unauthorized content and configuration changes, and availability by potentially disabling or defacing the website. For e-commerce, government, or enterprise sites, this could result in financial loss, reputational damage, regulatory penalties, and operational disruption. The ease of exploitation and lack of required user interaction increase the likelihood of automated attacks and widespread compromise. Organizations relying on Listee for critical web presence or customer engagement face significant risk until the vulnerability is remediated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately disable public user registration if not required or restrict it using plugins that enforce strict role assignment policies. If registration is necessary, implement custom validation to sanitize and enforce allowed user roles, ensuring no elevation to Administrator is possible via user input. Monitor registration logs for suspicious activity, such as unexpected Administrator account creations. Apply web application firewalls (WAFs) with rules to detect and block attempts to manipulate the user_role parameter. Regularly update the Listee theme and its plugins once the vendor releases a patch addressing this issue. Consider isolating or sandboxing WordPress installations using Listee to limit potential damage. Conduct thorough audits of existing user accounts to identify and remove any unauthorized Administrator accounts created before mitigation. Finally, educate site administrators about the risks and signs of compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T19:25:53.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1438e32ffcdb8a2fbeaf5

Added to database: 2/27/2026, 7:11:10 AM

Last enriched: 2/27/2026, 7:25:36 AM

Last updated: 2/27/2026, 8:12:17 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses