Description
The Postem Ipsum plugin for WordPress is vulnerable to unauthorized modification of data to Privilege Escalation due to a missing capability check on the postem_ipsum_generate_users() function in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary user accounts with the administrator role.
Published: 2025-12-13
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Administrator
Action: Apply Patch
AI Analysis

Impact

The Postem Ipsum plugin contains a missing capability check in the postem_ipsum_generate_users() function, allowing an authenticated user with Subscriber-level access or higher to create new user accounts with administrator privileges. This flaw enables attackers to elevate their privileges and compromise the integrity of the WordPress site, without affecting availability or confidentiality directly. The vulnerability is a classic privilege escalation via inadequate authorization control (CWE‑862).

Affected Systems

Vendor: franciscopalacios; Product: Postem Ipsum. Versions 3.0.1 and all earlier releases are vulnerable. No further sub‑versions or product variations are listed, so all builds up to and including 3.0.1 should be considered affected.

Risk and Exploitability

The CVSS score of 8.8 classifies the issue as critical severity, yet the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The lack of a KEV listing further suggests limited current exploitation activity. An attacker would need to be authenticated as a Subscriber or higher role and possess access to the WordPress dashboard or API to trigger the vulnerable function, so the attack vector is local to a logged‑in user. Given the high impact and sufficient authentication prerequisites, the risk to affected installations is moderate to high, especially on sites that grant Subscriber access. The risk is mitigated by disabling the vulnerable function or applying the vendor’s fix.

Generated by OpenCVE AI on April 22, 2026 at 16:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Postem Ipsum to 3.0.2 or later where the capability check has been added
  • If an immediate upgrade is not possible, remove or comment out the postem_ipsum_generate_users function in the plugin’s code to prevent its execution
  • Enforce stricter role permissions by ensuring only administrators can access any user‑generation functionalities
  • Monitor the site for sudden creation of administrator accounts and roll back any unauthorized changes

Generated by OpenCVE AI on April 22, 2026 at 16:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Postem Ipsum plugin for WordPress is vulnerable to unauthorized modification of data to Privilege Escalation due to a missing capability check on the postem_ipsum_generate_users() function in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary user accounts with the administrator role.
Title Postem Ipsum <= 3.0.1 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation in postem_ipsum_generate_users
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:42.941Z

Reserved: 2025-12-10T00:29:21.258Z

Link: CVE-2025-14397

cve-icon Vulnrichment

Updated: 2025-12-15T15:21:20.064Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:49.413

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:15:21Z

Weaknesses