CVE-2025-53428

HIGH
2025-10-22 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Oct 22, 2025 - 15:15 nvd
HIGH 8.8

Description

Incorrect Privilege Assignment vulnerability in N-Media Simple User Registration wp-registration allows Privilege Escalation.This issue affects Simple User Registration: from n/a through <= 6.8.

Analysis

Privilege escalation in N-Media Simple User Registration (WordPress plugin) through version 6.8 allows authenticated low-privilege users to elevate their access to administrator-level permissions via incorrect privilege assignment. With EPSS at 0.06% (17th percentile) and no public exploit identified at time of analysis, real-world exploitation risk remains low despite the high CVSS score. The vulnerability requires low-privilege authentication (PR:L) but has low attack complexity (AC:L) and no user interaction (UI:N), making it straightforward to exploit once an attacker has basic user credentials.

Technical Context

This vulnerability stems from CWE-266 (Incorrect Privilege Assignment), a class of authorization flaws where a system grants inappropriate permissions to users or processes. In WordPress plugin contexts, this typically manifests when registration or user management functionality fails to properly validate or restrict role assignments during account creation, profile updates, or administrative actions. The Simple User Registration plugin (wp-registration) handles WordPress user registration workflows, and the flaw likely exists in functions that assign user roles or capabilities without adequate authorization checks. An authenticated user with minimal privileges could manipulate registration parameters, API calls, or form submissions to assign themselves elevated roles such as Editor or Administrator, bypassing intended access controls in the WordPress role-based permission system.

Affected Products

N-Media Simple User Registration plugin (wp-registration) for WordPress versions from an unspecified initial release through version 6.8 are confirmed vulnerable. The plugin is identified in the WordPress plugin repository as wp-registration. All installations running version 6.8 or earlier should be considered at risk. The vendor Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp-registration/vulnerability/wordpress-simple-user-registration-plugin-6-4-privilege-escalation-vulnerability provides additional product-specific details, though the URL references version 6.4 while the CVE indicates the flaw persists through 6.8, suggesting the vulnerability may have been identified in 6.4 but remained unpatched through subsequent releases.

Remediation

WordPress administrators should immediately update the Simple User Registration (wp-registration) plugin to the latest version available from the WordPress plugin repository that addresses this vulnerability. At time of analysis, patch availability has not been independently confirmed from provided data sources. Site administrators should check the official WordPress plugin repository for updates or consult the vendor advisory at https://patchstack.com/database/Wordpress/Plugin/wp-registration/ for patch availability and specific remediation guidance. As an interim mitigation, restrict new user registration to administrator-approved workflows, audit existing user accounts for unauthorized privilege escalations, implement additional role-based access control monitoring, and consider temporarily disabling the plugin if user registration functionality is not business-critical until a confirmed patched version is deployed.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

CVE-2025-53428 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy