Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29004: CWE-266 Incorrect Privilege Assignment in AA-Team Premium Age Verification / Restriction for WordPress

0
High
VulnerabilityCVE-2025-29004cvecve-2025-29004cwe-266
Published: Tue Jan 06 2026 (01/06/2026, 20:25:59 UTC)
Source: CVE Database V5
Vendor/Project: AA-Team
Product: Premium Age Verification / Restriction for WordPress

Description

Incorrect Privilege Assignment vulnerability in AA-Team Premium Age Verification / Restriction for WordPress, AA-Team Responsive Coming Soon Landing Page / Holding Page for WordPress allows Privilege Escalation.This issue affects Premium Age Verification / Restriction for WordPress: from n/a through 3.0.2; Responsive Coming Soon Landing Page / Holding Page for WordPress: from n/a through 3.0.

AI-Powered Analysis

AILast updated: 01/06/2026, 20:56:02 UTC

Technical Analysis

CVE-2025-29004 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) affecting AA-Team's Premium Age Verification / Restriction and Responsive Coming Soon Landing Page plugins for WordPress. The issue arises because the plugins improperly assign privileges, enabling users with limited permissions to escalate their privileges to higher levels without requiring user interaction. This flaw impacts Premium Age Verification / Restriction versions up to 3.0.2 and Responsive Coming Soon Landing Page versions up to 3.0. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation could allow an attacker to gain administrative control over the affected WordPress site, potentially leading to data breaches, site defacement, or further malware deployment. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a prime target for attackers. The plugins are commonly used to enforce age restrictions or display coming soon pages, often on sites requiring compliance with legal age verification or marketing landing pages. The improper privilege assignment likely stems from flawed role or capability checks within the plugin code, allowing privilege escalation from subscriber or contributor roles to administrator or equivalent. This vulnerability underscores the importance of secure privilege management in WordPress plugins, especially those handling access control.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those operating websites with age-restricted content, e-commerce platforms, or marketing landing pages using the affected AA-Team plugins. Exploitation could lead to unauthorized administrative access, resulting in data theft, defacement, or disruption of services. This could compromise personal data protected under GDPR, leading to regulatory fines and reputational damage. The high CVSS score indicates that confidentiality, integrity, and availability of affected systems can be severely impacted. Organizations in sectors such as online retail, gaming, adult content, and regulated industries that rely on WordPress for public-facing sites are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation without user interaction increases urgency. Additionally, compromised sites could be used as pivot points for broader network attacks or to distribute malware, amplifying the threat to European digital infrastructure.

Mitigation Recommendations

Immediate mitigation involves monitoring for updates from AA-Team and applying patches as soon as they are released. In the absence of patches, organizations should restrict access to the WordPress admin area using IP whitelisting or VPNs and audit user roles to ensure minimal privileges are assigned. Disable or remove the affected plugins if they are not critical to operations. Implement Web Application Firewalls (WAFs) with rules to detect and block suspicious privilege escalation attempts targeting these plugins. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and their configurations. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials being leveraged. Review and harden WordPress security settings, including limiting plugin installations to trusted sources and maintaining least privilege principles. Finally, monitor logs for unusual activity indicative of privilege escalation attempts and prepare incident response plans tailored to WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:52.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d737806d60d7483a10a36

Added to database: 1/6/2026, 8:41:28 PM

Last enriched: 1/6/2026, 8:56:02 PM

Last updated: 1/8/2026, 7:29:58 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats