Description
The LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.29. This is due to the plugin not properly validating a user's identity via the 'wp-json/lazytasks/api/v1/user/role/edit/' REST API endpoint prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. It is also possible for attackers to abuse this endpoint to grant users with access to additional roles within the plugin
Published: 2025-12-12
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The LazyTasks plugin does not properly validate the identity of users calling the REST endpoint wp-json/lazytasks/api/v1/user/role/edit/. An unauthenticated attacker can alter any user’s email address, including that of administrators, and then use the password‑reset mechanism to gain control of the account. Because this allows the attacker to acquire any role within the plugin, it results in a full account takeover. The weakness is an authorization bypass (CWE‑862).

Affected Systems

The weakness affects the LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart plugin by lazycoders on WordPress. All versions up to and including 1.2.29 are impacted; users running any of the affected releases with an exposed REST API are vulnerable.

Risk and Exploitability

The CVSS base score is 9.8, indicating critical severity. The EPSS score is less than 1 %, suggesting that large numbers of exploits have not been observed yet, and the vulnerability is not listed in the CISA KEV catalog. However, the vulnerability can be exploited remotely over HTTP/HTTPS via the unprotected REST endpoint, which can be accessed by anyone with network connectivity to the WordPress site. An attacker only needs to send a crafted REST request to change the target email address and then trigger the password‑reset flow. If successful, the attacker can assume the target user’s privileges and potentially elevate to administrator access.

Generated by OpenCVE AI on April 21, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the LazyTasks plugin to the latest available version, which is expected to address the authorization issue.
  • As a fallback, block or restrict unauthenticated access to the wp-json/lazytasks/api/v1/user/role/edit/ endpoint (e.g., via a firewall rule or an access‑control plugin).
  • If a compromise is suspected, force a password reset and review the email addresses for all WordPress accounts, particularly administrators, to ensure no unauthorized changes have occurred.

Generated by OpenCVE AI on April 21, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 18 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Lazycoders
Lazycoders lazytasks
Wordpress
Wordpress wordpress
Vendors & Products Lazycoders
Lazycoders lazytasks
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.29. This is due to the plugin not properly validating a user's identity via the 'wp-json/lazytasks/api/v1/user/role/edit/' REST API endpoint prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. It is also possible for attackers to abuse this endpoint to grant users with access to additional roles within the plugin
Title LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart <= 1.2.29 - Missing Authorization to Uanuthenticated Privilege Escalation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Lazycoders Lazytasks
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:14.233Z

Reserved: 2025-11-10T17:09:20.924Z

Link: CVE-2025-12963

cve-icon Vulnrichment

Updated: 2025-12-18T20:37:11.319Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:40.647

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:30:37Z

Weaknesses