CVE-2025-5288

| EUVD-2025-18240 CRITICAL
2025-06-13 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2025-18240
CVE Published
Jun 13, 2025 - 03:15 nvd
CRITICAL 9.8

Description

The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges.

Analysis

The REST API | Custom API Generator For Cross Platform And Import Export plugin for WordPress (versions 1.0.0-2.0.3) contains a critical privilege escalation vulnerability where the process_handler() function lacks capability checks, allowing unauthenticated attackers to create administrator accounts via malicious JSON imports. With a CVSS score of 9.8 and network-based attack vector requiring no user interaction, this is a severe, likely actively exploited vulnerability affecting any WordPress installation using vulnerable plugin versions.

Technical Context

The vulnerability exists in a WordPress REST API plugin that generates custom API endpoints for data import/export functionality. The root cause is CWE-862 (Missing Authorization/Capability Check), where the process_handler() function fails to validate WordPress capabilities (wp_verify_nonce, current_user_can) before processing POST requests to the import_api endpoint. The plugin accepts arbitrary URLs via the import_api parameter and processes JSON payloads without authentication, directly instantiating user objects with administrator role assignment. This bypasses WordPress's standard privilege escalation protections, which rely on authenticated sessions and role-based access control (RBAC). The affected component is the custom REST endpoint handler, likely registered via add_rest_route() without proper permission callbacks.

Affected Products

Affected Product: REST API | Custom API Generator For Cross Platform And Import Export (WordPress Plugin). Affected Versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.3.0, 2.0.0, 2.0.1, 2.0.2, 2.0.3 (all versions prior to 2.0.4 or later patch). Estimated CPE: cpe:2.4:a:*:rest_api_custom_api_generator_for_cross_platform_and_import_export:*:*:*:*:*:wordpress:*:* (vendor slug to be confirmed from WordPress plugin directory). Configuration Risk: Any WordPress site with this plugin installed and activated on versions up to 2.0.3, regardless of authentication configuration. Unauthenticated remote access to wp-json endpoints means all public-facing WordPress sites are at risk.

Remediation

IMMEDIATE ACTIONS: (1) Update plugin to version 2.0.4 or later if available (patch release containing authorization checks on process_handler()); (2) If patch unavailable, disable/deactivate the plugin immediately and remove from wp-content/plugins/; (3) Conduct emergency audit of WordPress user accounts created after plugin installation—check wp_users table for suspicious admin accounts created via REST API. MITIGATION (if patch delay): Restrict access to wp-json endpoints via .htaccess (deny all wp-json/* POST requests from non-authenticated IPs), or use WordPress security plugins to block unauthenticated REST API POST requests. DETECTION: Search wp-admin audit logs and wp_users table for accounts created via REST API endpoint with empty referrer. CHECK VENDOR ADVISORY: Review WordPress.org plugin repository page for CVE-2025-5288 patch notes and changelog for confirmed patch version.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +49
POC: 0

Share

CVE-2025-5288 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy