Description
The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.
Published: 2026-02-12
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privileged Escalation to Site Admin
Action: Immediate Patch
AI Analysis

Impact

The Prime Listing Manager WordPress plugin through version 1.1 contains a hardcoded secret that allows an attacker to gain administrative privileges without any user account. This flaw bypasses authentication entirely, enabling the attacker to perform any authorized action on the website, such as modifying content, configuring settings, or extracting data. The impact is therefore full control of the site, consistent with an authentication bypass and improper access control weakness.

Affected Systems

The vulnerability affects the Prime Listing Manager plugin for WordPress up to and including version 1.1. Any installation using 1.1 or earlier is potentially exposed; no vendor or more granular version data is available beyond this range.

Risk and Exploitability

The CVSS base score of 9.8 reflects a critical severity. An EPSS score of less than 1% indicates a low probability of exploitation at this time, though the flaw is known. The vulnerability is not listed in CISA KEV. Assuming a remote attacker can reach the WordPress site, exploitation can be achieved by sending crafted HTTP requests that trigger the plugin’s hardcoded secret mechanism. Because no authenticated session is required beforehand, the attack vector is straightforward for anyone with network access to the host.

Generated by OpenCVE AI on April 27, 2026 at 21:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Prime Listing Manager to the latest version where the hardcoded secret has been removed or disable the plugin until a fix is available
  • Remove or neutralize the hardcoded secret within the plugin’s configuration files and set strict file permissions to prevent unauthorized changes
  • Configure a web application firewall to block known exploitation patterns targeting the plugin and restrict access to its administrative endpoints, while maintaining tighter firewall rules around the WordPress installation

Generated by OpenCVE AI on April 27, 2026 at 21:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-256
CWE-284

Thu, 12 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Prime Listing Manager
Prime Listing Manager prime Listing Manager
Wordpress
Wordpress wordpress
Vendors & Products Prime Listing Manager
Prime Listing Manager prime Listing Manager
Wordpress
Wordpress wordpress

Thu, 12 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.
Title Prime Listing Manager <= 1.1 - Unauthenticated Privilege Escalation
References

Subscriptions

Prime Listing Manager Prime Listing Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:55.100Z

Reserved: 2025-12-18T15:36:43.798Z

Link: CVE-2025-14892

cve-icon Vulnrichment

Updated: 2026-02-12T14:26:33.743Z

cve-icon NVD

Status : Deferred

Published: 2026-02-12T06:16:01.963

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T21:15:05Z

Weaknesses