CVE-2025-14866
Unknown Unknown - Not Provided
Privilege Escalation in Melapress Role Editor Plugin via Misconfigured Capability

Publication date: 2026-01-23

Last updated on: 2026-01-23

Assigner: Wordfence

Description
The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the 'save_secondary_roles_field' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to assign themselves additional roles including Administrator.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-01-23
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
melapress role_editor to 1.1.1 (inc)
melapress role_editor 1.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Melapress Role Editor plugin for WordPress has a vulnerability in versions up to 1.1.1 where a misconfigured capability check in the 'save_secondary_roles_field' function allows authenticated users with Subscriber-level access or higher to escalate their privileges. Specifically, these users can assign themselves additional roles, including Administrator, by exploiting insufficient permission checks when saving secondary roles. [4]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with low-level access (Subscriber or above) to escalate their privileges to Administrator. This means they could gain full control over the WordPress site, including managing users, installing plugins, changing site settings, and potentially executing malicious actions that compromise the site's security and integrity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, you can check if your WordPress installation is running the Melapress Role Editor plugin version 1.1.1 or earlier. Specifically, look for the presence of the vulnerable 'save_secondary_roles_field' function that lacks proper capability checks allowing privilege escalation. You can audit user roles to see if any Subscriber-level users have been assigned Administrator or other elevated roles unexpectedly. Commands to help detect suspicious role assignments include using WP-CLI to list users and their roles, for example: 1. List all users with their roles: wp user list --fields=ID,user_login,roles 2. Check for users with Administrator role: wp user list --role=administrator 3. Review recent changes to user roles by checking WordPress logs or database entries if available. Additionally, monitoring for unauthorized AJAX requests related to role changes (e.g., calls to AJAX actions registered by the plugin) could help detect exploitation attempts. [1, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the Melapress Role Editor plugin to version 1.2.0 or later, which includes fixes for this vulnerability by enforcing strict nonce verification, capability checks, and role validation to prevent unauthorized role modifications and privilege escalation. 2. Until the update is applied, restrict access to the plugin's role management features to trusted administrators only. 3. Audit current user roles to identify and remove any unauthorized elevated roles assigned to Subscriber-level users or others. 4. Implement monitoring for suspicious role changes or unauthorized AJAX requests related to role editing. 5. Consider temporarily disabling the plugin if immediate patching is not possible. These steps are based on the security enhancements introduced in version 1.2.0 that address the vulnerability. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated users with Subscriber-level access and above to escalate their privileges to Administrator by exploiting a misconfigured capability check. Such unauthorized privilege escalation can lead to unauthorized access to sensitive data and administrative functions, potentially violating data protection and privacy requirements under standards like GDPR and HIPAA. Organizations using the affected plugin may face compliance risks due to insufficient access controls and potential data breaches resulting from this vulnerability. [2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart