Plattform
wordpress
Komponente
doccure-core
Behoben in
1.5.4
CVE-2025-8900 represents a critical privilege escalation vulnerability discovered in the Doccure Core WordPress plugin. This flaw allows unauthenticated attackers to elevate their privileges to administrator level, potentially granting them complete control over the WordPress site. The vulnerability affects versions 1.0.0 through 1.5.4, and a fix is available in version 1.5.4.
Successful exploitation of CVE-2025-8900 grants an attacker complete control over the WordPress site. This includes the ability to modify content, install malicious plugins, create new administrator accounts, and potentially access sensitive data stored within the WordPress database. The impact is particularly severe for sites hosting sensitive patient information or financial data, as an attacker could exfiltrate this data or use the compromised site to launch further attacks against users or connected systems. This vulnerability presents a significant risk of data breach and website defacement.
CVE-2025-8900 was publicly disclosed on 2025-11-03. While no public proof-of-concept (PoC) code has been released, the simplicity of the vulnerability suggests a high probability of exploitation. The vulnerability is not currently listed on the CISA KEV catalog. Given the ease of exploitation and the potential impact, organizations using Doccure Core should prioritize patching.
Websites utilizing the Doccure Core plugin, particularly those running versions 1.0.0 through 1.5.4, are at significant risk. Shared hosting environments where users have limited control over plugin updates are especially vulnerable. Sites with weak password policies or those that haven't implemented multi-factor authentication are also at increased risk.
• wordpress / composer / npm:
grep -r 'user_type' /var/www/html/doccure-core/• wordpress / composer / npm:
wp plugin list | grep doccure-core• wordpress / composer / npm:
wp plugin update doccure-core• generic web: Check user registration forms for the ability to specify a user role during account creation.
disclosure
Exploit-Status
EPSS
0.19% (40% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-8900 is to immediately upgrade the Doccure Core plugin to version 1.5.4 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling new user registration to prevent attackers from exploiting the vulnerability. While not a complete solution, implementing a Web Application Firewall (WAF) with rules to block requests containing suspicious 'user_type' values can provide an additional layer of defense. Monitor WordPress logs for unusual account creation attempts, specifically looking for administrator role assignments during registration.
Aktualisieren Sie das Doccure Core Plugin auf Version 1.5.4 oder höher, um die Privilege Escalation Vulnerability zu beheben. Dieses Update behebt die Art und Weise, wie Benutzerrollen während der Registrierung verwaltet werden, und verhindert so, dass Angreifer Administratorrechte erlangen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-8900 is a critical vulnerability in Doccure Core WordPress plugin allowing unauthenticated attackers to gain administrator privileges by manipulating user registration.
You are affected if you are using Doccure Core versions 1.0.0 through 1.5.4. Upgrade to version 1.5.4 to mitigate the risk.
Upgrade the Doccure Core plugin to version 1.5.4 or later. Temporarily disable user registration if immediate upgrade is not possible.
While no public exploits have been released, the vulnerability's simplicity suggests a potential for active exploitation. Monitor security advisories.
Refer to the Doccure Core plugin's official website or WordPress plugin repository for the latest advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.