Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3609: CWE-863 Incorrect Authorization in pixel_prime Reales WP STPT

0
Medium
VulnerabilityCVE-2025-3609cvecve-2025-3609cwe-863
Published: Tue May 06 2025 (05/06/2025, 01:42:44 UTC)
Source: CVE
Vendor/Project: pixel_prime
Product: Reales WP STPT

Description

The Reales WP STPT plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 2.1.2. This is due to the 'reales_user_signup_form' AJAX action not verifying if user registration is enabled, prior to registering a user. This makes it possible for unauthenticated attackers to create new user accounts, which can be leveraged with CVE-XX to achieve privilege escalation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:38:37 UTC

Technical Analysis

CVE-2025-3609 is an authorization vulnerability classified under CWE-863 affecting the Reales WP STPT plugin for WordPress. The issue stems from the 'reales_user_signup_form' AJAX action failing to verify whether user registration is enabled before processing requests. This lack of proper authorization checks allows unauthenticated attackers to create new user accounts arbitrarily, bypassing any administrative controls that might disable user registration. The vulnerability affects all versions up to 2.1.2 inclusive. Although the vulnerability itself does not directly lead to privilege escalation, it can be leveraged in conjunction with other vulnerabilities (e.g., CVE-XX referenced in the description) to escalate privileges within the WordPress environment. The CVSS 3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity as unauthorized accounts can be created, potentially undermining the trust model of the site. No patches or fixes are currently linked, and no known exploits are reported in the wild. The vulnerability was reserved in mid-April 2025 and published in early May 2025, with enrichment from CISA indicating recognized risk. This vulnerability highlights the importance of proper authorization checks in AJAX handlers, especially in widely used CMS plugins.

Potential Impact

The primary impact of CVE-2025-3609 is unauthorized user account creation on WordPress sites using the vulnerable Reales WP STPT plugin. This can undermine site integrity by allowing attackers to register accounts without administrative consent, potentially enabling further malicious activities such as posting spam, phishing, or reconnaissance. When combined with other vulnerabilities, attackers may escalate privileges, gaining administrative access and full control over the site. This can lead to data breaches, defacement, malware distribution, or pivoting to internal networks. The vulnerability affects all sites using the plugin up to version 2.1.2, which may include a significant number of WordPress installations globally. Although no known exploits are currently in the wild, the ease of exploitation (no authentication or user interaction required) means attackers could quickly weaponize this flaw once public details are widely known. Organizations relying on this plugin face risks to their website integrity, user trust, and potentially broader network security if privilege escalation is achieved.

Mitigation Recommendations

1. Immediately check if your WordPress site uses the Reales WP STPT plugin and identify the version installed. 2. Monitor the plugin vendor’s official channels for patches or updates addressing CVE-2025-3609 and apply them promptly once available. 3. If no patch is available, consider temporarily disabling the plugin or the vulnerable AJAX action to prevent unauthorized registrations. 4. Restrict access to the AJAX endpoint 'reales_user_signup_form' via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. 5. Implement monitoring and alerting for unusual user registration activity to detect exploitation attempts early. 6. Harden WordPress user registration settings by disabling user registration globally if not needed. 7. Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and privilege escalation chains. 8. Educate site administrators about the risks of unauthorized account creation and ensure strong password policies and multi-factor authentication for all users. 9. Review and limit plugin usage to only trusted and actively maintained components to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-14T20:16:57.211Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdac7c

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 2/27/2026, 1:38:37 PM

Last updated: 3/25/2026, 12:02:55 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses