Description
The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.
Published: 2025-03-08
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation to administrator
Action: Immediate Patch
AI Analysis

Impact

The Javo Core WordPress plugin contains a flaw that lets any visitor create a new account and assign the administrator role during registration. The attacker does not need to be logged in; by sending a request to the ajax_signup endpoint the plugin stores the supplied role without validation. If the supplied role is administrator, the attacker gains full control over the WordPress site.

Affected Systems

The vulnerability affects the Javo Core plugin from javothemes, all releases up to and including version 3.0.0.080, on any WordPress installation running those versions.

Risk and Exploitability

The CVSS score of 9.8 indicates a critically high risk. The EPSS value of less than 1% suggests that exploitation is currently unlikely, but the flaw is publicly known and could be used in targeted attacks. It is not listed in CISA’s KEV catalog. The likely attack vector is an unauthenticated remote request to the plugin’s ajax_signup endpoint to set an admin role.

Generated by OpenCVE AI on April 22, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Javo Core plugin to any version newer than 3.0.0.080 that no longer allows role assignment during registration.
  • If an upgrade is not immediately possible, restrict or disable the ajax_signup endpoint or enforce that only authenticated users can assign roles.
  • After remediation, scan the site’s user database for administrator accounts created without justification and revert or delete those accounts.

Generated by OpenCVE AI on April 22, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7357 The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.
History

Thu, 13 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Javothemes
Javothemes javo Core
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:javothemes:javo_core:*:*:*:*:*:wordpress:*:*
Vendors & Products Javothemes
Javothemes javo Core

Mon, 10 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 08 Mar 2025 08:30:00 +0000

Type Values Removed Values Added
Description The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.
Title Javo Core <= 3.0.0.080 - Unauthenticated Privilege Escalation in ajax_signup
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Javothemes Javo Core
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:54.532Z

Reserved: 2025-01-02T18:41:56.474Z

Link: CVE-2025-0177

cve-icon Vulnrichment

Updated: 2025-03-10T15:55:33.712Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-08T09:15:31.420

Modified: 2025-03-13T13:05:42.730

Link: CVE-2025-0177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:30:17Z

Weaknesses