Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14892: CWE-269 Improper Privilege Management in Prime Listing Manager

0
Unknown
VulnerabilityCVE-2025-14892cvecve-2025-14892cwe-269
Published: Thu Feb 12 2026 (02/12/2026, 06:00:05 UTC)
Source: CVE Database V5
Product: Prime Listing Manager

Description

The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.

AI-Powered Analysis

AILast updated: 02/12/2026, 06:30:34 UTC

Technical Analysis

CVE-2025-14892 is a vulnerability identified in the Prime Listing Manager WordPress plugin, versions up to 1.1, characterized by improper privilege management (CWE-269). The root cause is a hardcoded secret within the plugin that allows an attacker to bypass authentication entirely and gain administrative privileges on the targeted WordPress site. This means an unauthenticated attacker can execute any administrative action, including modifying site content, installing malicious code, or exfiltrating sensitive data. The vulnerability does not require any user interaction or prior account on the site, making it highly exploitable. The plugin's design flaw in handling privilege escalation stems from embedding a static secret that is either publicly discoverable or easily guessable, which effectively nullifies any access control mechanisms. Although no public exploits have been reported yet, the potential for exploitation is significant due to the nature of WordPress as a widely used CMS and the critical level of access gained. The vulnerability was reserved in December 2025 and published in February 2026, but no patches or fixes have been released at the time of this report, increasing the urgency for mitigation. The absence of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the impact of CVE-2025-14892 can be severe. Organizations running websites with the Prime Listing Manager plugin are at risk of complete site compromise, leading to unauthorized data access, defacement, malware distribution, or use of the site as a pivot point for further network attacks. This can result in loss of customer trust, regulatory penalties under GDPR for data breaches, and operational downtime. E-commerce platforms and service providers relying on WordPress are particularly vulnerable, as attackers could manipulate listings, steal customer information, or disrupt business operations. The ease of exploitation without authentication increases the risk of widespread attacks, especially targeting small and medium enterprises that may lack robust security monitoring. Additionally, the lack of a patch means organizations must rely on temporary mitigations, increasing exposure time. The reputational and financial damage could be significant, especially in sectors like retail, hospitality, and professional services prevalent across Europe.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the Prime Listing Manager plugin until a security patch is released. Organizations should monitor official plugin repositories and security advisories for updates. If the plugin is essential, restrict access to the WordPress admin interface via IP whitelisting or VPN to reduce exposure. Implement web application firewalls (WAFs) with custom rules to detect and block requests containing the hardcoded secret or suspicious administrative access attempts. Conduct thorough audits of user accounts and logs to detect any unauthorized access. Employ regular backups and ensure recovery plans are in place to restore compromised sites quickly. Educate site administrators about the vulnerability and the importance of timely updates. Finally, consider alternative plugins with better security track records if the Prime Listing Manager plugin remains unpatched for an extended period.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-18T15:36:43.798Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d70304b57a58fa1de47f9

Added to database: 2/12/2026, 6:16:16 AM

Last enriched: 2/12/2026, 6:30:34 AM

Last updated: 2/12/2026, 7:37:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats