CVE-2025-2470: CWE-266 Incorrect Privilege Assignment in aonetheme Service Finder Bookings
The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability.
AI Analysis
Technical Summary
The Service Finder Bookings WordPress plugin suffers from an incorrect privilege assignment vulnerability (CWE-266) due to insufficient validation of user roles during account registration through the 'nsl_registration_store_extra_input' function. This allows unauthenticated attackers to create accounts with elevated privileges, including Administrator, when registering via social login, provided the Nextend Social Login plugin is active. The vulnerability affects all versions up to 5.1 and has a critical CVSS 3.1 score of 9.8.
Potential Impact
Successful exploitation enables unauthenticated attackers to gain administrative access to affected WordPress sites, compromising confidentiality, integrity, and availability. Attackers can fully control the site, potentially leading to complete site takeover, data theft, or disruption of services.
Mitigation Recommendations
No official patch or fix is currently available for this vulnerability. Users should monitor the vendor's advisory for updates. Until a fix is released, it is recommended to disable or uninstall the Service Finder Bookings plugin or the Nextend Social Login plugin to prevent exploitation. Additionally, restrict social login functionality or user registration if possible. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
CVE-2025-2470: CWE-266 Incorrect Privilege Assignment in aonetheme Service Finder Bookings
Description
The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Service Finder Bookings WordPress plugin suffers from an incorrect privilege assignment vulnerability (CWE-266) due to insufficient validation of user roles during account registration through the 'nsl_registration_store_extra_input' function. This allows unauthenticated attackers to create accounts with elevated privileges, including Administrator, when registering via social login, provided the Nextend Social Login plugin is active. The vulnerability affects all versions up to 5.1 and has a critical CVSS 3.1 score of 9.8.
Potential Impact
Successful exploitation enables unauthenticated attackers to gain administrative access to affected WordPress sites, compromising confidentiality, integrity, and availability. Attackers can fully control the site, potentially leading to complete site takeover, data theft, or disruption of services.
Mitigation Recommendations
No official patch or fix is currently available for this vulnerability. Users should monitor the vendor's advisory for updates. Until a fix is released, it is recommended to disable or uninstall the Service Finder Bookings plugin or the Nextend Social Login plugin to prevent exploitation. Additionally, restrict social login functionality or user registration if possible. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-17T17:35:16.136Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf079c
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 4/9/2026, 10:08:49 AM
Last updated: 5/12/2026, 11:33:31 PM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.