Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8572: CWE-269 Improper Privilege Management in dreamstechnologies Truelysell Core

0
Critical
VulnerabilityCVE-2025-8572cvecve-2025-8572cwe-269
Published: Sat Feb 14 2026 (02/14/2026, 08:26:47 UTC)
Source: CVE Database V5
Vendor/Project: dreamstechnologies
Product: Truelysell Core

Description

The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.

AI-Powered Analysis

AILast updated: 02/14/2026, 08:48:50 UTC

Technical Analysis

CVE-2025-8572 is a critical security vulnerability identified in the Truelysell Core plugin for WordPress, affecting all versions up to and including 1.8.7. The root cause is improper privilege management (CWE-269), specifically insufficient validation of the user_role parameter during the user registration process. This flaw enables unauthenticated attackers to manipulate the user_role parameter to assign themselves elevated privileges, including administrator rights, without any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical severity with a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is comprehensive, affecting confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully control the affected WordPress site, potentially leading to data breaches, site defacement, or service disruption. Although no known exploits have been observed in the wild yet, the vulnerability's characteristics make it highly exploitable. The plugin is commonly used in WordPress environments, often in e-commerce or marketplace contexts, increasing the attractiveness of targets. The vulnerability was reserved in August 2025 and published in February 2026, indicating recent discovery and disclosure. No official patches or updates are currently linked, emphasizing the urgency for vendors and users to address this issue promptly.

Potential Impact

For European organizations, the impact of CVE-2025-8572 is significant. Exploitation allows attackers to gain administrative control over WordPress sites running the vulnerable Truelysell Core plugin, which can lead to full compromise of website content, user data, and backend systems. This can result in data breaches involving personal and financial information, reputational damage, and operational disruptions, especially for e-commerce platforms or marketplaces relying on this plugin. The ability to escalate privileges without authentication means attackers can bypass all access controls, making traditional perimeter defenses ineffective. Additionally, compromised sites can be used to distribute malware, conduct phishing campaigns, or serve as launchpads for further attacks within corporate networks. Given the widespread use of WordPress across Europe, particularly in small to medium enterprises and digital services, the threat surface is broad. Regulatory implications under GDPR are also critical, as data breaches could lead to substantial fines and legal consequences. The absence of known exploits in the wild currently provides a window for proactive mitigation but also suggests that attackers may soon develop weaponized exploits due to the vulnerability's simplicity and severity.

Mitigation Recommendations

1. Immediate action should be taken to update the Truelysell Core plugin to a patched version once released by the vendor. Until then, consider disabling the plugin or removing it entirely if feasible. 2. Restrict user registration on WordPress sites to trusted users only, or disable public registration to prevent unauthorized account creation. 3. Implement strict server-side validation of user_role and other critical parameters to ensure they cannot be manipulated during registration or profile updates. 4. Monitor logs and user account creation activities for unusual patterns, such as new administrator accounts created without proper authorization. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to exploit this vulnerability by filtering suspicious user_role parameter values. 6. Conduct regular security audits and penetration testing focused on privilege escalation vectors within WordPress environments. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider isolating WordPress instances in segmented network zones to limit lateral movement if compromise occurs. 9. Backup website data frequently and verify restoration procedures to minimize downtime and data loss in case of an incident.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-04T22:01:31.166Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69903384c9e1ff5ad8746a0b

Added to database: 2/14/2026, 8:34:12 AM

Last enriched: 2/14/2026, 8:48:50 AM

Last updated: 2/20/2026, 9:50:57 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats