Description
The WP Freeio plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.21. This is due to the process_register() function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Published: 2025-10-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

The WP Freeio plugin’s process_register() function fails to enforce role restrictions during user registration. As a result, any visitor can submit the 'administrator' role, causing the system to grant full admin privileges to an unauthenticated account. This vulnerability is a classic case of privilege escalation (CWE‑269) and would allow an attacker to modify, delete, or steal site data and install additional malicious components.

Affected Systems

The flaw exists in the ApusTheme WP Freeio plugin for WordPress in all releases up to and including version 1.2.21. Any site running one of these releases is at risk; versions newer than 1.2.21 are not known to be affected.

Risk and Exploitability

The CVSS score of 9.8 categorizes this flaw as critical. An attacker can exploit it from any network location using the public registration form, with no prior authentication required. Although the EPSS score is below 1 %, indicating a low overall exploitation probability, the ease of attack and the severity of the potential impact justify immediate attention. The flaw is not listed in CISA’s Known Exploited Vulnerabilities catalog, but its high severity warrants concern.

Generated by OpenCVE AI on April 27, 2026 at 23:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Freeio plugin to the newest version that includes the role‑restriction fix; if unable to update, disable the plugin or migrate to a different marketplace theme.
  • Secure or disable the public registration page to prevent unauthenticated role assignments during sign‑ups.
  • Enforce role validation server‑side by restricting role options to authorized users only, ensuring that role parameters passed during registration are ignored for non‑admin users who are not logged in.

Generated by OpenCVE AI on April 27, 2026 at 23:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 14 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 07:30:00 +0000

Type Values Removed Values Added
Description The WP Freeio plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.21. This is due to the process_register() function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Title WP Freeio <= 1.2.21 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:19.502Z

Reserved: 2025-10-08T19:53:45.076Z

Link: CVE-2025-11533

cve-icon Vulnrichment

Updated: 2025-10-14T13:31:41.145Z

cve-icon NVD

Status : Deferred

Published: 2025-10-11T08:15:32.157

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:45:15Z

Weaknesses