CVE-2025-13619
Unknown Unknown - Not Provided
Privilege Escalation in Flex Store Users Plugin Allows Admin Access

Publication date: 2025-12-20

Last updated on: 2025-12-20

Assigner: Wordfence

Description
The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.0. This is due to the 'fsUserHandle::signup' and the 'fsSellerRole::add_role_seller' functions not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can be exploited with the 'fs_type' parameter if the Flex Store Seller plugin is also activated.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-20
Last Modified
2025-12-20
Generated
2026-05-07
AI Q&A
2025-12-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress flex_store_users_plugin *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Flex Store Users plugin for WordPress up to version 1.1.0. It allows unauthenticated attackers to escalate their privileges by exploiting the 'fsUserHandle::signup' and 'fsSellerRole::add_role_seller' functions, which do not properly restrict the user roles that can be assigned during registration. Attackers can supply the 'administrator' role during signup and gain full administrator access to the WordPress site. This exploit can also be triggered using the 'fs_type' parameter if the Flex Store Seller plugin is active.


How can this vulnerability impact me? :

The vulnerability can have severe impacts as it allows attackers to gain administrator-level access without authentication. This means an attacker can take full control of the affected WordPress site, including modifying content, installing malicious plugins or themes, stealing sensitive data, and disrupting site operations. The high CVSS score (9.8) reflects the critical nature of this risk.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Flex Store Users plugin to a version later than 1.1.0 once available. If an update is not yet available, disable the Flex Store Users plugin and the Flex Store Seller plugin if activated, to prevent exploitation. Additionally, review user roles and registrations for any unauthorized administrator accounts and remove them.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart