Description
The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the 'paypal-submit.php' file not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Published: 2025-11-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises because the Tiger theme’s paypal-submit.php script does not validate the role assigned during user registration. An attacker can submit a registration form with the administrator role before any authentication is required, resulting in immediate administrative privileges on the WordPress site. The impact is full control over site content, settings, and data, leading to potential data theft, site defacement, or further compromise.

Affected Systems

All versions of the Tiger theme for WordPress from the initial release up through and including 101.2.1 are affected. The theme is distributed via the WordPress theme marketplace and can be installed on any WordPress installation that supports the theme. No specific WordPress core versions are mentioned, so any site running these theme versions is at risk.

Risk and Exploitability

The CVSS score of 9.8 categorizes this as Critical, with the EPSS score indicating low current exploitation probability but not zero. Because the flaw allows unauthenticated privilege escalation through a publicly reachable form, the attack vector is a remote, unauthenticated web request. The vulnerability is not yet listed in the CISA KEV catalog, but its high severity warrants prompt remediation. Attackers could exploit this with minimal skill by submitting a crafted registration request directed at the paypal-submit.php endpoint.

Generated by OpenCVE AI on April 21, 2026 at 01:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tiger theme to the latest version that removes the role selection vulnerability once it is released.
  • If an update is not immediately available, modify the theme’s user registration mechanism to enforce a non-administrative role or disable role selection entirely.
  • Use a web application firewall or security plugin to block or filter requests to paypal-submit.php from unauthenticated users.
  • Monitor the WordPress admin area for new user accounts with elevated privileges and remove any unexpected administrator accounts.

Generated by OpenCVE AI on April 21, 2026 at 01:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Directorythemes
Directorythemes tiger
Wordpress
Wordpress wordpress
Vendors & Products Directorythemes
Directorythemes tiger
Wordpress
Wordpress wordpress

Thu, 27 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the 'paypal-submit.php' file not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Title Tiger <= 101.2.1 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Directorythemes Tiger
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:59.006Z

Reserved: 2025-11-25T18:34:34.513Z

Link: CVE-2025-13675

cve-icon Vulnrichment

Updated: 2025-11-28T14:42:07.963Z

cve-icon NVD

Status : Deferred

Published: 2025-11-27T05:16:15.060

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses