CVE-2025-53428
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
Incorrect Privilege Assignment vulnerability in N-Media Simple User Registration wp-registration allows Privilege Escalation.This issue affects Simple User Registration: from n/a through <= 6.8.
Analysis
Privilege escalation in N-Media Simple User Registration (WordPress plugin) through version 6.8 allows authenticated low-privilege users to elevate their access to administrator-level permissions via incorrect privilege assignment. With EPSS at 0.06% (17th percentile) and no public exploit identified at time of analysis, real-world exploitation risk remains low despite the high CVSS score. The vulnerability requires low-privilege authentication (PR:L) but has low attack complexity (AC:L) and no user interaction (UI:N), making it straightforward to exploit once an attacker has basic user credentials.
Technical Context
This vulnerability stems from CWE-266 (Incorrect Privilege Assignment), a class of authorization flaws where a system grants inappropriate permissions to users or processes. In WordPress plugin contexts, this typically manifests when registration or user management functionality fails to properly validate or restrict role assignments during account creation, profile updates, or administrative actions. The Simple User Registration plugin (wp-registration) handles WordPress user registration workflows, and the flaw likely exists in functions that assign user roles or capabilities without adequate authorization checks. An authenticated user with minimal privileges could manipulate registration parameters, API calls, or form submissions to assign themselves elevated roles such as Editor or Administrator, bypassing intended access controls in the WordPress role-based permission system.
Affected Products
N-Media Simple User Registration plugin (wp-registration) for WordPress versions from an unspecified initial release through version 6.8 are confirmed vulnerable. The plugin is identified in the WordPress plugin repository as wp-registration. All installations running version 6.8 or earlier should be considered at risk. The vendor Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp-registration/vulnerability/wordpress-simple-user-registration-plugin-6-4-privilege-escalation-vulnerability provides additional product-specific details, though the URL references version 6.4 while the CVE indicates the flaw persists through 6.8, suggesting the vulnerability may have been identified in 6.4 but remained unpatched through subsequent releases.
Remediation
WordPress administrators should immediately update the Simple User Registration (wp-registration) plugin to the latest version available from the WordPress plugin repository that addresses this vulnerability. At time of analysis, patch availability has not been independently confirmed from provided data sources. Site administrators should check the official WordPress plugin repository for updates or consult the vendor advisory at https://patchstack.com/database/Wordpress/Plugin/wp-registration/ for patch availability and specific remediation guidance. As an interim mitigation, restrict new user registration to administrator-approved workflows, audit existing user accounts for unauthorized privilege escalations, implement additional role-based access control monitoring, and consider temporarily disabling the plugin if user registration functionality is not business-critical until a confirmed patched version is deployed.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today