Description
The age-restriction WordPress plugin through 3.0.2 does not have authorisation in the age_restrictionRemoteSupportRequest function, allowing any authenticated users, such as subscriber to create an admin user with a hardcoded username and arbitrary password.
Published: 2025-11-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Update Plugin
AI Analysis

Impact

The vulnerability resides in the WordPress Age Restriction plugin version 3.0.2 and earlier. The function age_restrictionRemoteSupportRequest lacks proper authorization checks, permitting any authenticated user—including subscribers—to invoke it. By calling this endpoint the user can create a new administrator account with a hardcoded username and a password chosen at the time of creation. This allows a low‑privileged authenticated user to obtain full administrative rights over the WordPress installation, compromising confidentiality, integrity, and availability of the site.

Affected Systems

The affected system is the WordPress Age Restriction plugin, versions up to and including 3.0.2. Users running this plugin on any WordPress environment—regardless of hosting provider or host platform—are at risk. No vendor name was provided, so the plugin is identified by its public name, Age Restriction.

Risk and Exploitability

The CVSS score of 7.5 indicates a high‑severity vulnerability that allows remote privileged escalation. The EPSS score is below 1 %, suggesting that active exploitation is unlikely at present and it is not listed in the CISA KEV catalog. However, the attack requires only authenticated access; anyone with subscriber privileges can exploit it by triggering the vulnerable function. Because the abuse creates an administrator account, the impact is total control over the WordPress installation. Attackers could use existing login credentials to execute the exploit, making it a straightforward privilege escalation and thus a notable risk for sites with many subscriber users.

Generated by OpenCVE AI on April 27, 2026 at 22:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Age Restriction plugin to version 3.0.3 or later, which patches the missing authorization check.
  • If immediate upgrade is not possible, temporarily deactivate the plugin or delete the age_restrictionRemoteSupportRequest exposure until the patch is deployed.
  • Restrict the ability for non‑administrator roles to access the function by removing the corresponding capability or applying a capability filter.

Generated by OpenCVE AI on April 27, 2026 at 22:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-285

Thu, 13 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 12 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 06:15:00 +0000

Type Values Removed Values Added
Description The age-restriction WordPress plugin through 3.0.2 does not have authorisation in the age_restrictionRemoteSupportRequest function, allowing any authenticated users, such as subscriber to create an admin user with a hardcoded username and arbitrary password.
Title Age Restriction <= 3.0.2 - Subscriber+ Privilege Escalation
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:51.658Z

Reserved: 2025-10-16T13:04:43.871Z

Link: CVE-2025-11855

cve-icon Vulnrichment

Updated: 2025-11-12T21:28:12.005Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T06:15:35.000

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:00:13Z

Weaknesses