CVE-2025-8572

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers to create accounts with high-level permissions, including administrator access, on WordPress sites using the Truelysell Core plugin version 1.8.7 or earlier. The issue arises because the plugin does not properly check user roles during registration, meaning even someone who is not logged in can exploit this flaw.

Technical Description

The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Feb 14, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago