Description
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user registration function that fails to properly sanitize the user_role parameter. This makes it possible for unauthenticated attackers to register as Administrator by manipulating the user_role parameter during registration.
Published: 2026-02-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Workaround
AI Analysis

Impact

A flaw in Listee’s bundled core plugin allows anyone who registers a new account to specify the user_role parameter without proper sanitization. This flaw lets an unauthenticated attacker create an Administrator account and gain full control over the WordPress site, including the ability to modify content, install plugins, or exfiltrate data. The vulnerability is identified as CWE‑269, Improper Restriction of Operations within the Bounds of a User.

Affected Systems

The issue applies to every release of the Listee WordPress theme published up to and including version 1.1.6. Sites running those versions are exposed regardless of other security settings, as the vulnerable registration code is shipped with the theme by Dreamstechnologies.

Risk and Exploitability

The base score of 9.8 indicates a critical flaw. The EPSS score of less than 1 % denotes a low probability of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit the flaw by sending a crafted registration request to the public registration endpoint with the user_role set to Administrator; no prior authentication or special network permissions are required.

Generated by OpenCVE AI on April 21, 2026 at 15:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact Dreamstechnologies or review the theme’s release notes to determine whether an official patch that correctly validates the user_role parameter has been released.
  • If no patch is available, remove or hide the user_role field from the registration form so that users cannot select elevated roles.
  • Force all new registrations to be assigned the default "Subscriber" role by adding a custom snippet or using a role‑management plugin, ensuring that elevated roles cannot be granted during account creation.

Generated by OpenCVE AI on April 21, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Dreamstechnologies
Dreamstechnologies listee
Wordpress
Wordpress wordpress
Vendors & Products Dreamstechnologies
Dreamstechnologies listee
Wordpress
Wordpress wordpress

Fri, 27 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user registration function that fails to properly sanitize the user_role parameter. This makes it possible for unauthenticated attackers to register as Administrator by manipulating the user_role parameter during registration.
Title Listee <= 1.1.6 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dreamstechnologies Listee
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:26:00.860Z

Reserved: 2025-11-10T19:25:53.619Z

Link: CVE-2025-12981

cve-icon Vulnrichment

Updated: 2026-02-27T18:46:56.124Z

cve-icon NVD

Status : Deferred

Published: 2026-02-27T07:17:09.300

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:00:13Z

Weaknesses