CVE-2025-5483: CWE-862 Missing Authorization in niaj Connector Wizard (formerly LC Wizard)
The LC Wizard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check in the ghl-wizard/inc/wp_user.php file in versions 1.2.10 to 1.3.0. This makes it possible for unauthenticated attackers to create new user accounts with the administrator role when the PRO functionality is enabled.
AI Analysis
Technical Summary
CVE-2025-5483 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the niaj Connector Wizard WordPress plugin, previously known as LC Wizard, specifically versions 1.2.10 through 1.3.0. The flaw exists in the ghl-wizard/inc/wp_user.php file where a critical capability check is absent. This omission allows unauthenticated attackers to bypass authorization controls and create new user accounts with administrator privileges, but only when the plugin's PRO functionality is enabled. The vulnerability is remotely exploitable over the network without requiring any prior authentication or user interaction. The CVSS v3.1 score of 8.1 indicates high severity, with impacts on confidentiality, integrity, and availability of the WordPress site. An attacker gaining administrator access can fully compromise the site, including installing malicious code, stealing sensitive data, or disrupting services. Although no known exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the vulnerability make it a significant threat. The vulnerability was publicly disclosed on November 7, 2025, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps. The plugin is used in WordPress environments, which are widely adopted across Europe, particularly in small to medium enterprises and content-driven websites. The vulnerability's exploitation could lead to widespread defacements, data breaches, or use of compromised sites as launchpads for further attacks.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress as a content management system across various sectors including government, education, and commerce. Successful exploitation results in full administrative control over the affected WordPress site, enabling attackers to manipulate website content, steal sensitive information, deploy malware, or pivot to internal networks. This can lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Organizations relying on the niaj Connector Wizard plugin with PRO features enabled are particularly vulnerable. The impact extends beyond the compromised site, as attackers could use it for phishing, spreading ransomware, or launching attacks against other infrastructure. Given the high CVSS score and the lack of authentication or user interaction requirements, the threat is critical for any exposed WordPress installations using this plugin. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of rapid exploitation remains high once exploit code becomes available.
Mitigation Recommendations
Immediate mitigation steps include auditing all WordPress installations for the presence of the niaj Connector Wizard plugin, particularly versions 1.2.10 through 1.3.0. If the plugin is found, organizations should disable the PRO functionality until a security patch is released. If possible, uninstall the plugin entirely or revert to a secure version once available. Implement strict access controls on WordPress admin areas and monitor logs for any suspicious user account creations or privilege escalations. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this vulnerability. Regularly update all WordPress plugins and core software to minimize exposure to known vulnerabilities. Additionally, conduct internal security awareness to recognize signs of compromise and prepare incident response plans specific to WordPress breaches. Organizations should subscribe to vendor advisories and CVE databases for updates on patches or exploit disclosures related to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-5483: CWE-862 Missing Authorization in niaj Connector Wizard (formerly LC Wizard)
Description
The LC Wizard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check in the ghl-wizard/inc/wp_user.php file in versions 1.2.10 to 1.3.0. This makes it possible for unauthenticated attackers to create new user accounts with the administrator role when the PRO functionality is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-5483 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the niaj Connector Wizard WordPress plugin, previously known as LC Wizard, specifically versions 1.2.10 through 1.3.0. The flaw exists in the ghl-wizard/inc/wp_user.php file where a critical capability check is absent. This omission allows unauthenticated attackers to bypass authorization controls and create new user accounts with administrator privileges, but only when the plugin's PRO functionality is enabled. The vulnerability is remotely exploitable over the network without requiring any prior authentication or user interaction. The CVSS v3.1 score of 8.1 indicates high severity, with impacts on confidentiality, integrity, and availability of the WordPress site. An attacker gaining administrator access can fully compromise the site, including installing malicious code, stealing sensitive data, or disrupting services. Although no known exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the vulnerability make it a significant threat. The vulnerability was publicly disclosed on November 7, 2025, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps. The plugin is used in WordPress environments, which are widely adopted across Europe, particularly in small to medium enterprises and content-driven websites. The vulnerability's exploitation could lead to widespread defacements, data breaches, or use of compromised sites as launchpads for further attacks.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress as a content management system across various sectors including government, education, and commerce. Successful exploitation results in full administrative control over the affected WordPress site, enabling attackers to manipulate website content, steal sensitive information, deploy malware, or pivot to internal networks. This can lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Organizations relying on the niaj Connector Wizard plugin with PRO features enabled are particularly vulnerable. The impact extends beyond the compromised site, as attackers could use it for phishing, spreading ransomware, or launching attacks against other infrastructure. Given the high CVSS score and the lack of authentication or user interaction requirements, the threat is critical for any exposed WordPress installations using this plugin. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of rapid exploitation remains high once exploit code becomes available.
Mitigation Recommendations
Immediate mitigation steps include auditing all WordPress installations for the presence of the niaj Connector Wizard plugin, particularly versions 1.2.10 through 1.3.0. If the plugin is found, organizations should disable the PRO functionality until a security patch is released. If possible, uninstall the plugin entirely or revert to a secure version once available. Implement strict access controls on WordPress admin areas and monitor logs for any suspicious user account creations or privilege escalations. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this vulnerability. Regularly update all WordPress plugins and core software to minimize exposure to known vulnerabilities. Additionally, conduct internal security awareness to recognize signs of compromise and prepare incident response plans specific to WordPress breaches. Organizations should subscribe to vendor advisories and CVE databases for updates on patches or exploit disclosures related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-02T20:30:02.458Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d71c16e13fd093e3db3f9
Added to database: 11/7/2025, 4:12:49 AM
Last enriched: 11/7/2025, 4:13:04 AM
Last updated: 11/7/2025, 6:25:12 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives
MediumCVE-2025-12527: CWE-862 Missing Authorization in yydevelopment Page & Post Notes
MediumCVE-2025-12520: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jgwhite33 WP Airbnb Review Slider
MediumCVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor
HighCVE-2025-64339: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.