CVE-2025-69182
BaseFortify
Publication date: 2026-01-22
Last updated on: 2026-01-27
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| patchstack | institutions_directory | to 1.3.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-69182 is a high-priority privilege escalation vulnerability in the WordPress Institutions Directory Plugin (versions up to 1.3.4). It allows a user with low-level privileges, such as a Subscriber or Developer, to escalate their privileges to a higher level, potentially gaining full control over the affected WordPress website. This vulnerability falls under the OWASP Top 10 category A7: Identification and Authentication Failures and has a CVSS severity score of 8.8. [1]
How can this vulnerability impact me? :
This vulnerability can allow a malicious low-privileged user to escalate their privileges and gain full control over the affected WordPress website. This could lead to unauthorized access, modification, or deletion of website content, compromise of sensitive data, and potentially complete takeover of the site, posing a significant security risk. [1]
What immediate steps should I take to mitigate this vulnerability?
Since no official patch is available for CVE-2025-69182, it is strongly recommended to apply the mitigation rule issued by Patchstack to block attacks exploiting this privilege escalation vulnerability. Users should implement this mitigation immediately to protect their WordPress websites using the Institutions Directory Plugin up to version 1.3.4. Additionally, monitoring for suspicious privilege escalation attempts and limiting subscriber-level access where possible can help reduce risk until a patch is released. [1]