Impact
The vulnerability in the Tiger theme for WordPress allows authenticated users with Subscriber-level privileges or higher to elevate their account to an administrator. This is caused by the theme's plugin permitting role updates via the $user->set_role() function. The resulting exploit grants full administrative rights, enabling the attacker to modify site content, install malicious plugins, and access sensitive data, thereby compromising confidentiality, integrity, and availability of the WordPress installation.
Affected Systems
All installations of the Tiger WordPress theme with version 101.2.1 or earlier are affected. The theme, provided by DirectoryThemes, is used on WordPress sites that rely on this social network theme.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity for privilege escalation. The EPSS score of less than 1% suggests exploitation is currently rare, and the vulnerability is not listed in CISA KEV. The attack vector requires an authenticated user, so an attacker must have at least Subscriber access and exploit the $user->set_role() function exposed by the theme. Once executed, the attacker can gain administrator rights and control over the site.
OpenCVE Enrichment