Description
The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.
Published: 2025-03-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of API keys via unauthenticated AJAX actions, enabling server‑side request forgery and potential internal service abuse
Action: Upgrade
AI Analysis

Impact

The Resido real‑estate WordPress theme allows unauthenticated users to call the delete_api_key and save_api_key AJAX actions without a capability check. This omission permits attackers to send requests to internal services and alter the API key settings of the site, effectively bypassing authorized controls and exposing sensitive credentials or facilitating further access through internal network resources.

Affected Systems

Any WordPress installation using the SmartDataSoft Resido theme version 3.6 or earlier is vulnerable. The issue resides in the listed themelist and is not limited to a specific sub‑plugin or configuration variant.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% shows a low likelihood of exploitation in the wild. The vulnerability is not yet listed in CISA's KEV catalog, suggesting that large‑scale attacks are not currently observed. Attackers would need only to craft unauthenticated AJAX requests targeting the vulnerable theme’s endpoints, a simple technique that can be automated if the vulnerability is publicly known.

Generated by OpenCVE AI on April 21, 2026 at 21:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Resido theme to the latest available version that implements a capability check on the delete_api_key and save_api_key AJAX actions.
  • If an immediate theme upgrade is not possible, add a capability verification to those AJAX endpoints, or restrict access to logged‑in users with an appropriate role or permission level.
  • As an interim workaround, disable or remove the API key functionality from the theme until a patch is applied, reducing the attack surface.

Generated by OpenCVE AI on April 21, 2026 at 21:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6442 The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00076}

epss

{'score': 0.00106}


Fri, 14 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.
Title Resido - Real Estate WordPress Theme <= 3.6 - Missing Authorization to Unauthenticated Server-Side Request Forgery and API Key Settings Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:53.732Z

Reserved: 2025-02-13T17:58:40.682Z

Link: CVE-2025-1285

cve-icon Vulnrichment

Updated: 2025-03-14T15:13:45.539Z

cve-icon NVD

Status : Deferred

Published: 2025-03-14T05:15:41.977

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1285

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses