Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67956: Missing Authorization in wpeverest User Registration

0
High
VulnerabilityCVE-2025-67956cvecve-2025-67956
Published: Thu Jan 22 2026 (01/22/2026, 16:51:56 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration

Description

Missing Authorization vulnerability in wpeverest User Registration user-registration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Registration: from n/a through <= 4.4.6.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:12:48 UTC

Technical Analysis

CVE-2025-67956 is a missing authorization vulnerability found in the wpeverest User Registration WordPress plugin, affecting all versions up to and including 4.4.6. The core issue stems from incorrectly configured access control security levels within the user-registration functionality, which allows unauthenticated attackers to bypass authorization checks. This means an attacker can perform actions or access data that should be restricted, without needing any credentials or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible to attackers. The impact is primarily on confidentiality (C:H), allowing attackers to access sensitive user data, with a lesser impact on integrity (I:L), potentially enabling limited unauthorized modifications. Availability is not affected (A:N). The vulnerability was reserved in December 2025 and published in January 2026, with no patches currently available, and no known exploits detected in the wild. Given the widespread use of WordPress and the popularity of the wpeverest User Registration plugin for managing user sign-ups, this vulnerability presents a significant risk to websites relying on this plugin for user management. Attackers exploiting this flaw could harvest personal information, create unauthorized accounts, or manipulate registration workflows, potentially leading to further attacks or data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-67956 is considerable. Many businesses, government agencies, and service providers in Europe rely on WordPress and associated plugins like wpeverest for their web presence and user management. Exploitation could lead to unauthorized access to sensitive user data, including personal identifiable information (PII), which is subject to strict GDPR regulations. A breach could result in significant legal penalties, reputational damage, and loss of customer trust. Additionally, attackers could leverage compromised registrations to escalate privileges or launch further attacks such as phishing or account takeover. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the risk of automated attacks targeting vulnerable sites. The absence of patches at the time of publication means organizations must rely on interim controls, increasing operational risk. The confidentiality breach potential is particularly critical given the sensitivity of user data handled by registration systems.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the user registration endpoints by implementing web application firewall (WAF) rules that block suspicious or anomalous registration requests, especially those originating from untrusted IP ranges or exhibiting automated behavior. 2. Conduct a thorough review of access control configurations within the wpeverest plugin settings and WordPress user roles to ensure no excessive permissions are granted to unauthenticated users. 3. Disable or restrict the user registration functionality temporarily if feasible until an official patch is released. 4. Monitor logs for unusual registration activity, such as spikes in new accounts or repeated access attempts to registration endpoints. 5. Employ rate limiting on registration-related API calls to reduce the risk of automated exploitation. 6. Stay informed through vendor advisories and security bulletins for the release of patches or updates addressing this vulnerability and apply them promptly. 7. Consider implementing multi-factor authentication (MFA) for user accounts created via registration to mitigate potential misuse. 8. Educate site administrators about the risk and encourage regular security audits of plugins and access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:16.553Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259154623b1157c7fae8c

Added to database: 1/22/2026, 5:06:29 PM

Last enriched: 1/30/2026, 8:12:48 AM

Last updated: 2/7/2026, 4:57:50 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats