Plattform
wordpress
Komponente
findall-listing
Behoben in
1.0.6
CVE-2025-13538 represents a critical Privilege Escalation vulnerability within the FindAll Listing plugin for WordPress. This flaw allows unauthenticated attackers to bypass intended access controls and potentially gain administrator privileges on a WordPress site. The vulnerability impacts versions 1.0.0 through 1.0.5 of the plugin, and a fix is available in version 1.1.
The impact of this vulnerability is severe. An attacker can bypass standard authentication mechanisms and directly gain administrative control over the WordPress site. This grants them complete access to sensitive data, including user credentials, financial information, and website content. They can modify website configurations, install malicious code, deface the site, or even steal the entire database. The requirement for the FindAll Membership plugin to be active adds a layer of dependency, but significantly expands the attack surface if that plugin is deployed.
This vulnerability was publicly disclosed on 2025-11-27. While no active exploitation campaigns have been publicly confirmed, the critical severity and ease of exploitation suggest a high probability of exploitation. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept code is likely to emerge given the vulnerability's nature and severity.
WordPress sites utilizing both the FindAll Listing and FindAll Membership plugins, particularly those with legacy configurations or those that haven't implemented robust user access controls, are at significant risk. Shared hosting environments where multiple WordPress sites share the same server resources are also vulnerable, as a compromise of one site could potentially lead to the compromise of others.
• wordpress / plugin: Use wp-cli plugin update to check the installed version of FindAll Listing.
• wordpress / plugin: Check the wp-config.php file for any unusual configurations related to user roles or registration parameters.
• wordpress / plugin: Search plugin files for the findalllistinguserregistrationadditional_params function and its usage.
• generic web: Monitor WordPress access logs for POST requests to the user registration endpoint with suspicious parameters, particularly those attempting to set the user role to 'administrator'.
grep -i 'administrator' /var/log/apache2/access.log | grep 'wp-login.php'disclosure
Exploit-Status
EPSS
0.15% (35% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to immediately upgrade the FindAll Listing plugin to version 1.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling the 'findalllistinguserregistrationadditional_params' function within the plugin’s code (if possible and safe) to restrict user role assignment during registration. Monitor WordPress access logs for suspicious user registration attempts, particularly those attempting to register with the 'administrator' role. After upgrading, confirm the fix by attempting a user registration with an administrator role and verifying that it is rejected.
Aktualisieren Sie auf Version 1.1 oder eine neuere gepatchte Version
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-13538 is a critical vulnerability in the FindAll Listing WordPress plugin allowing unauthenticated attackers to gain administrator access by manipulating user registration roles, requiring the FindAll Membership plugin to be active.
You are affected if you are using FindAll Listing plugin versions 1.0.0 through 1.0.5 and also have the FindAll Membership plugin installed.
Upgrade the FindAll Listing plugin to version 1.1 or later. If immediate upgrade is not possible, disable the plugin until an upgrade can be performed.
As of the current date, there are no confirmed reports of active exploitation, but the vulnerability's severity and ease of exploitation suggest it could become a target.
Refer to the FindAll Listing plugin's official website or WordPress plugin repository for the latest advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.