CVE-2025-13619
Privilege Escalation in Flex Store Users Plugin Allows Admin Access
Publication date: 2025-12-20
Last updated on: 2025-12-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | flex_store_users_plugin | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Flex Store Users plugin for WordPress up to version 1.1.0. It allows unauthenticated attackers to escalate their privileges by exploiting the 'fsUserHandle::signup' and 'fsSellerRole::add_role_seller' functions, which do not properly restrict the user roles that can be assigned during registration. Attackers can supply the 'administrator' role during signup and gain full administrator access to the WordPress site. This exploit can also be triggered using the 'fs_type' parameter if the Flex Store Seller plugin is active.
How can this vulnerability impact me? :
The vulnerability can have severe impacts as it allows attackers to gain administrator-level access without authentication. This means an attacker can take full control of the affected WordPress site, including modifying content, installing malicious plugins or themes, stealing sensitive data, and disrupting site operations. The high CVSS score (9.8) reflects the critical nature of this risk.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Flex Store Users plugin to a version later than 1.1.0 once available. If an update is not yet available, disable the Flex Store Users plugin and the Flex Store Seller plugin if activated, to prevent exploitation. Additionally, review user roles and registrations for any unauthorized administrator accounts and remove them.