Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4474: CWE-285 Improper Authorization in vinoth06 Frontend Dashboard

0
High
VulnerabilityCVE-2025-4474cvecve-2025-4474cwe-285
Published: Tue May 13 2025 (05/13/2025, 06:40:56 UTC)
Source: CVE
Vendor/Project: vinoth06
Product: Frontend Dashboard

Description

The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_admin_setting_form_function() function in versions 1.0 to 2.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the plugin’s 'register' role setting to make new user registrations default to the administrator role, leading to an elevation of privileges to that of an administrator.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:33:50 UTC

Technical Analysis

CVE-2025-4474 is a privilege escalation vulnerability classified under CWE-285 (Improper Authorization) affecting the vinoth06 Frontend Dashboard plugin for WordPress, specifically versions 1.0 through 2.2.7. The vulnerability stems from the fed_admin_setting_form_function() function lacking proper capability checks, which means it does not verify whether the authenticated user has sufficient privileges before allowing changes to critical plugin settings. An attacker with at least Subscriber-level access can exploit this flaw to overwrite the plugin’s 'register' role setting, causing new user registrations to be assigned the administrator role by default. This effectively allows attackers to escalate their privileges to full administrative control without needing higher privileges initially. The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and only requiring low privileges. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the potential for complete site takeover.

Potential Impact

The vulnerability allows attackers with minimal privileges (Subscriber-level) to escalate to administrator privileges, granting full control over the affected WordPress site. This can lead to unauthorized access to sensitive data, modification or deletion of content, installation of backdoors or malware, and disruption of website availability. The ability to manipulate user roles undermines the integrity of the site's access control mechanisms, potentially compromising all users and data managed by the site. For organizations relying on the affected plugin, this could result in data breaches, reputational damage, loss of customer trust, and regulatory compliance violations. The widespread use of WordPress globally means that many organizations, especially those with less stringent user access controls, are at risk. The vulnerability’s remote exploitability and lack of user interaction required make it a highly attractive target for attackers.

Mitigation Recommendations

Organizations should immediately audit user roles and permissions within their WordPress installations, especially focusing on the Subscriber role and any unexpected administrative accounts. Until an official patch is released, administrators should consider disabling or uninstalling the vinoth06 Frontend Dashboard plugin if it is not essential. If the plugin is required, restrict access to the plugin’s settings page using additional access control mechanisms such as web application firewalls (WAFs) or custom code to enforce capability checks. Monitoring for unusual user registrations or privilege escalations should be implemented. Additionally, enforce strong authentication and consider multi-factor authentication (MFA) for administrative accounts to reduce the risk of compromised credentials. Regular backups and incident response plans should be updated to quickly recover from potential compromises. Once a patch is available, apply it promptly and verify that the vulnerability is remediated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-08T19:57:39.408Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6612

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 2/27/2026, 2:33:50 PM

Last updated: 3/26/2026, 9:22:48 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses