CVE-2025-5117
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/05/2025
Last modified:
28/05/2025
Description
The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/admin/pages/payment-inc/paypal-submit.php#L128
- https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/property.php#L1964
- https://plugins.trac.wordpress.org/changeset/3299714/
- https://wordpress.org/plugins/property/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/df48f7f9-7bc9-4f9b-b9b5-6bfb86309030?source=cve



