Skip to main content

CVE-2025-5117: CWE-862 Missing Authorization in themeglow Property – Real Estate Directory Listing

High
VulnerabilityCVE-2025-5117cvecve-2025-5117cwe-862
Published: Tue May 27 2025 (05/27/2025, 11:14:26 UTC)
Source: CVE Database V5
Vendor/Project: themeglow
Product: Property – Real Estate Directory Listing

Description

The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.

AI-Powered Analysis

AILast updated: 07/11/2025, 11:49:00 UTC

Technical Analysis

CVE-2025-5117 is a high-severity privilege escalation vulnerability affecting the Property – Real Estate Directory Listing plugin for WordPress, developed by themeglow. Specifically, versions 1.0.5 of this plugin contain a missing authorization check (CWE-862) related to the property_package_user_role metadata. The vulnerability allows an authenticated attacker with Author-level access or higher to escalate their privileges to administrator. This is achieved by creating a package post with the property_package_user_role set to 'administrator' and then submitting the PayPal registration form. The lack of proper capability checks means that the plugin does not verify whether the user is authorized to assign administrator roles, enabling privilege escalation without requiring user interaction beyond form submission. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, and no user interaction needed. The impact includes full compromise of the WordPress site, allowing attackers to execute arbitrary code, modify content, and potentially pivot to other systems. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and poses a significant risk to affected installations. No official patches are listed yet, so mitigation relies on other controls until updates are available.

Potential Impact

For European organizations using WordPress sites with the Property – Real Estate Directory Listing plugin version 1.0.5, this vulnerability poses a severe risk. Real estate companies, agencies, and property listing platforms relying on this plugin could face full site compromise, leading to data breaches involving sensitive customer information, financial data, and business-critical content. Attackers gaining administrator privileges can deface websites, inject malicious code, or use the compromised site as a foothold for further attacks within the organization's network. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), financial losses, and operational disruption. Given the plugin’s niche market, the impact is concentrated but critical for affected entities. The lack of user interaction and low complexity of exploitation increase the likelihood of automated attacks targeting vulnerable sites across Europe.

Mitigation Recommendations

1. Immediate mitigation involves restricting Author-level and higher user roles to trusted personnel only, minimizing the risk of insider threats or compromised accounts. 2. Monitor WordPress user roles and audit recent changes to detect unauthorized privilege escalations. 3. Disable or remove the Property – Real Estate Directory Listing plugin version 1.0.5 until a patched version is released. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests related to package post creation and PayPal form submissions that attempt to set property_package_user_role to 'administrator'. 5. Enforce strong authentication mechanisms, including multi-factor authentication (MFA) for all users with elevated privileges. 6. Regularly review and update WordPress core, plugins, and themes to the latest secure versions once patches become available. 7. Conduct security awareness training for site administrators to recognize and respond to privilege escalation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-23T10:58:13.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835afe5182aa0cae2104bfa

Added to database: 5/27/2025, 12:28:21 PM

Last enriched: 7/11/2025, 11:49:00 AM

Last updated: 8/5/2025, 11:04:29 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats