Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13538: CWE-269 Improper Privilege Management in Elated Themes FindAll Listing

0
Critical
VulnerabilityCVE-2025-13538cvecve-2025-13538cwe-269
Published: Thu Nov 27 2025 (11/27/2025, 04:36:42 UTC)
Source: CVE Database V5
Vendor/Project: Elated Themes
Product: FindAll Listing

Description

The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This is due to the 'findall_listing_user_registration_additional_params' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if the FindAll Membership plugin is also activated, because user registration is in that plugin.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:59:19 UTC

Technical Analysis

CVE-2025-13538 is a critical security vulnerability identified in the FindAll Listing plugin for WordPress, developed by Elated Themes. This vulnerability is classified under CWE-269 (Improper Privilege Management) and affects all plugin versions up to and including 1.0.5. The root cause lies in the 'findall_listing_user_registration_additional_params' function, which fails to properly restrict the user roles that can be assigned during the registration process. Specifically, it allows unauthenticated attackers to supply the 'administrator' role parameter during user registration, thereby escalating their privileges to full administrative access on the WordPress site. However, exploitation is contingent on the FindAll Membership plugin also being activated, as this plugin manages the user registration functionality. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical severity with an attack vector that requires no authentication or user interaction, and impacts confidentiality, integrity, and availability at the highest levels. Although no known exploits are currently reported in the wild, the flaw presents a significant risk due to the ease of exploitation and the potential for complete site takeover. The vulnerability was publicly disclosed on November 27, 2025, with no official patches released at the time of reporting. This vulnerability highlights a severe design flaw in privilege management within the plugin's user registration process, making it a high-priority issue for site administrators using these plugins.

Potential Impact

The impact of CVE-2025-13538 is severe for organizations running WordPress sites with the FindAll Listing and FindAll Membership plugins installed. An attacker can gain full administrative privileges without authentication, enabling them to control the entire website. This includes the ability to modify or delete content, install malicious plugins or backdoors, steal sensitive data, disrupt site availability, and potentially pivot to other internal systems if the WordPress site is part of a larger network. The compromise of administrator accounts can lead to long-term persistence and widespread damage. Given WordPress's widespread use across industries, including e-commerce, media, education, and government, the vulnerability poses a significant risk to confidentiality, integrity, and availability of affected sites globally. The ease of exploitation and lack of required user interaction further exacerbate the threat, making it attractive for attackers to exploit rapidly once publicized. Organizations that rely on these plugins for membership and listing functionalities face an urgent need to address this vulnerability to prevent full site compromise.

Mitigation Recommendations

To mitigate CVE-2025-13538, organizations should immediately disable user registration functionality within the FindAll Membership plugin if possible, to prevent exploitation. If disabling registration is not feasible, temporarily deactivate the FindAll Listing and FindAll Membership plugins until a security patch is released by Elated Themes. Administrators should monitor official vendor channels for updates and apply patches promptly once available. Additionally, implement strict monitoring and alerting for suspicious user account creations, especially those with elevated privileges. Employ web application firewalls (WAFs) with custom rules to block requests attempting to assign the 'administrator' role during registration. Conduct thorough audits of existing user accounts to identify and remove any unauthorized administrator accounts created prior to mitigation. Finally, ensure that WordPress core and all plugins are kept up to date, and consider restricting plugin installations to trusted sources only. These steps go beyond generic advice by focusing on immediate containment, proactive detection, and strict access control tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-22T04:52:29.052Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927d764d4a4bdffcb26cfd7

Added to database: 11/27/2025, 4:45:24 AM

Last enriched: 2/27/2026, 9:59:19 AM

Last updated: 3/26/2026, 10:06:26 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses