CVE-2025-12882
Privilege Escalation in Clasifico Listing Plugin via Role Parameter
Publication date: 2026-02-19
Last updated on: 2026-02-19
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| clasifico | listing_plugin | to 2.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Clasifico Listing plugin for WordPress has a privilege escalation vulnerability in versions up to and including 2.0. This occurs because the plugin allows users who are registering new accounts to specify their own user role via the 'listing_user_role' parameter.
As a result, an unauthenticated attacker can exploit this by registering an account and assigning themselves the administrator role, thereby gaining elevated privileges they should not have.
How can this vulnerability impact me? :
This vulnerability can have severe impacts because it allows an attacker to gain administrator-level access without authentication.
- The attacker can fully control the WordPress site, including modifying content, installing malicious plugins, or stealing sensitive data.
- It can lead to complete compromise of the website's integrity, confidentiality, and availability.
- The high CVSS score of 9.8 reflects the critical nature of this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know