CRITICALCVE-2025-0177CVSS 9.8

Javo Core <= 3.0.0.080 - Unauthenticated Privilege Escalation in ajax_signup

traduction en cours…

Plateforme

wordpress

Composant

javo-core

Corrigé dans

3.0.1

AI Confidence: highNVDEPSS 0.7%Révisé: mai 2026
Traduction vers votre langue…

CVE-2025-0177 is a critical privilege escalation vulnerability affecting the Javo Core plugin for WordPress. This flaw allows unauthenticated attackers to elevate their privileges to administrator level by simply creating a new user account. The vulnerability impacts versions 0 through 3.0.0.080 of the plugin. A patch is expected from the vendor.

WordPress

Détecte cette CVE dans ton projet

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.

Impact et Scénarios d'Attaquetraduction en cours…

The impact of this vulnerability is severe. An attacker exploiting CVE-2025-0177 can gain complete control over a WordPress site. This includes the ability to modify content, install malicious plugins, steal sensitive data (user credentials, customer information, financial data), and potentially use the compromised site to launch further attacks against other systems. The ease of exploitation – requiring only account creation – significantly increases the risk of widespread compromise, particularly for sites with weak security practices.

Contexte d'Exploitationtraduction en cours…

This vulnerability is considered high risk due to its critical CVSS score and the ease of exploitation. Public proof-of-concept code is likely to emerge quickly, increasing the likelihood of widespread exploitation. Monitor security advisories and threat intelligence feeds for updates on exploitation activity. The vulnerability was publicly disclosed on 2025-03-08.

Qui Est à Risquetraduction en cours…

WordPress websites using the Javo Core plugin, particularly those with default or weak security configurations, are at significant risk. Shared hosting environments where multiple websites share the same server infrastructure are also vulnerable, as a compromise of one site could potentially lead to the compromise of others.

Étapes de Détectiontraduction en cours…

• wordpress / composer / npm:

wp plugin list | grep javo-core

• wordpress / composer / npm:

wp plugin update javo-core --all

• wordpress / composer / npm:

wp plugin status javo-core

• wordpress / composer / npm:

wp user list --field=role

• wordpress / composer / npm:

wp user search --role=administrator

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.73% (percentile 73%)

CISA SSVC

Exploitationnone
Automatisableyes
Impact Techniquetotal

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantjavo-core
Fournisseurjavothemes
Plage affectéeCorrigé dans
0 – 3.0.0.0803.0.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Sans correctif — 442 jours depuis la divulgation

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2025-0177 is to upgrade to a patched version of the Javo Core plugin as soon as it becomes available. Until a patch is released, consider temporarily disabling user registration on the WordPress site to prevent attackers from creating administrator accounts. Implementing a Web Application Firewall (WAF) with rules to block suspicious account creation attempts can also provide a layer of defense. Regularly review user accounts and permissions to identify and remove any unauthorized administrator accounts.

Comment corrigertraduction en cours…

Actualice el plugin Javo Core a una versión corregida. La vulnerabilidad permite a usuarios no autenticados asignar roles de administrador, por lo que es crucial aplicar la actualización para mitigar el riesgo de escalada de privilegios.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2025-0177 — Privilege Escalation in Javo Core?

CVE-2025-0177 is a critical vulnerability in the Javo Core WordPress plugin that allows unauthenticated attackers to gain administrator privileges by creating new user accounts, granting them full control over the website.

Am I affected by CVE-2025-0177 in Javo Core?

If you are using Javo Core plugin versions 0 through 3.0.0.080, you are potentially affected by this vulnerability. Check your plugin version and upgrade as soon as a patch is available.

How do I fix CVE-2025-0177 in Javo Core?

The recommended fix is to upgrade to a patched version of the Javo Core plugin. Until a patch is released, disable user registration or implement a WAF to block suspicious account creation attempts.

Is CVE-2025-0177 being actively exploited?

While active exploitation is not yet confirmed, the vulnerability's critical severity and ease of exploitation suggest it is likely to be targeted soon. Monitor security advisories and threat intelligence feeds.

Where can I find the official Javo Core advisory for CVE-2025-0177?

Refer to the Javo Core plugin's official website or WordPress plugin repository for the latest security advisory and patch information.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.