Description
The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
Published: 2025-07-01
Score: 9.8 Critical
EPSS: 23.6% Moderate
KEV: No
Impact: Privilege Escalation to Administrator Role
Action: Apply Patch
AI Analysis

Impact

The Opal Estate Pro plugin’s on_regiser_user function does not enforce role validation during user registration, allowing an unauthenticated attacker to specify any role, including Administrator. This flaw enables the creation of an account with full administrative rights, compromising the confidentiality, integrity, and availability of the affected WordPress site. The vulnerability is classified as CWE‑269.

Affected Systems

WordPress installations that use the Opal Estate Pro plugin by wpopal, versions up to and including 1.7.5, are impacted. Sites that employ the FullHouse Real Estate Responsive WordPress Theme and include this plugin are also vulnerable if they run a susceptible version.

Risk and Exploitability

The CVSS score of 9.8 marks this as critical, and the EPSS score of 24% indicates a moderate to high likelihood of exploitation in the near term. Although the vulnerability is not listed in the CISA KEV catalog, it remains exploitable by anyone who can reach the registration endpoint. The likely attack vector is an unauthenticated HTTP request to the plugin’s registration handler with a manipulated role parameter to assign Administrator privileges.

Generated by OpenCVE AI on April 21, 2026 at 19:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Opal Estate Pro plugin to the latest available version that enforces role checks during user registration.
  • If an upgrade is not immediately possible, modify the plugin or its configuration so that the role assignment during registration defaults to a low‑privilege role, such as Subscriber, and removes the ability to select higher roles.
  • Use a web application firewall or security plugin to detect and block requests that attempt to set the role parameter to "Administrator" during user registration.

Generated by OpenCVE AI on April 21, 2026 at 19:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00099}

epss

{'score': 0.00037}


Wed, 02 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
Title Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation via 'on_regiser_user'
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
Wpopal Opal Estate
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:51.677Z

Reserved: 2025-06-30T17:52:44.462Z

Link: CVE-2025-6934

cve-icon Vulnrichment

Updated: 2025-07-01T13:47:17.937Z

cve-icon NVD

Status : Deferred

Published: 2025-07-01T07:15:27.340

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6934

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:00:25Z

Weaknesses